• Article
  • | |
  • Metrics
  • |
  • Reference [38]
  • |
  • Related
  • |
  • Cited by [2]
  • | |
  • Comments
    Abstract:

    This paper analyzes the previous study of applying P2P technology in mobile Internet. It first introduces the P2P technology and the conception of mobile Internet, and presents the challenges and service pattern of P2P technology in mobile Internet. Second, the architectures of P2P technology in mobile Internet are described in terms of centralized architecture, super node architecture and ad hoc architecture, respectively. Further more, the resource location algorisms and cross-layer optimizations are introduced based on two different terminal access patterns. Detailed analyses of different key technologies are presented and the disadvantages are pointed out. At last, this paper outlines future research directions.

    Reference
    [1] Huang Y, Jin BH. A survey of overlay optimization techniques in unstructured P2P Systems. Mini-Micro Systems, 2008,2: 238?244 (in Chinese with English abstract).
    [2] Wang CG, Li B. Peer-to-Peer overlay networks: A survey. Technical Report, Department of Computer Science, Hong KongUniversity of Science and Technology, 2003.
    [3] Hoyoung K, Jinwoo K, Yeonsoo L, Minhee C, Youngwan C. An empirical study of the use contexts and usability problems in mobile Internet. In: Proc. of the 35th Annual Hawaii Int’l Conf. on System Sciences (HICSS 2002), Vol.5. Washington: IEEE Computer Society, 2002. 1767?1776.
    [4] Ding G, Bhargava B. Peer-to-Peer file-sharing over mobile ad hoc networks. In: Proc. of the 2nd IEEE Annual Conf. on Pervasive Computing and Communications Workshops. Washington: IEEE Computer Society, 2004. 104?108.
    [5] http://baike.baidu.com/view/1453028.htm
    [6] Ou ZH, Song MN, Zhan XS, Song JD. Key techniques for mobile peer-to-peer networks: A survey. Journal of Software, 2008, 19(1):126?140 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/19/126.htm
    [7] Kato T, Ishikawa N, Sumino H, Hjelm J, Yu Y, Murakami S. A platform and applications for mobile peer-to-peer communications. 2003. http://www.research.att.com/rjana/Takeshi_Kato.pdf
    [8] Sumino H, Ishikawa N, Kato T. Design and implementation of P2P protocol for mobile phones. In: Proc. of the 4th Annual IEEE Int’l Conf. on Pervasive Computing and Communications Workshops (PERCOMW 2006). Washington: IEEE Computer Society, 2006. 157?162.
    [9] Traversat B, Arora A, Abdelaziz M, Duigou M, Haywood C, Hugly JC, Pouyoul E, Yeager B. Project JXTA 2.0 super-peer virtual network. 2003. http://research.sun.com/spotlight/misc/jxta.pdf
    [10] Yuan M. Mobile P2P messaging, part 2: Develop mobile extensions to generic P2P networks. 2003. http://www.ibm.com/ developerworks/java/library/wi-p2pmsg2/
    [11] Kellerer W, Kunzmann G, Schollmeier R, Z?ls S. Structured peer-to-peer systems for telecommunications and mobile environments. Int’l Journal of Electronics and Communications, 2006,60(1):25?29.
    [12] Kellerer W, Despotovic Z, Michel M, Zoels S, Hofstaetter Q. Towards a mobile peer-to-peer service platform. In: Proc. of the 3rd IEEE SPMS Workshop in Conjunction with IEEE SAINT 2007. Washington: IEEE Computer Society, 2007. 15?19.
    [13] Kortuem G. Proem: A middleware platform for mobile peer-to-peer computing. ACM SIGMOBILE Mobile Computing and Communications Review, 2002,6(4):62?64.
    [14] Kortuem G, Schneider J, Preuitt D, Thompson TGC, Fickas S, Segall Z. When peer-to-peer comes face-to-face: Collaborative peer-to-peer computing in mobile ad-hoc networks. In: Graham RL, Shahmehri N, eds. Proc. of the Int’l Conf. on Peer- to-Peer Computing (P2P 2001). Los Alamitos: IEEE Computer Society, 2001. 75?91.
    [15] Andersen F, de Meer H, Dedinski I. An architecture concept for mobile P2P file sharing services. In: Proc. of the Workshop at Informatik 2004-Algorithms and Protocols for Efficient Peer-to-Peer Applications. Bonner K?llen Verlag, 2004. 229?233.
    [16] Hu THT, Thai B, Seneviratne A. Supporting mobile devices in Gnutella file sharing network with mobile agents. In: Proc. of the 8th IEEE Int’l Symp. on Computers and Communication, Vol.2. Washington: IEEE Computer Society, 2003. 1035?1040.
    [17] Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H. Chord: A scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Trans. on Networking, 2003,11(1):17?32.
    [18] Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content addressable network. In: Proc. of the 2001 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2001. 161?172.
    [19] Rowstron A, Druschel P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proc. of the 18th IFIP/ACM Int’l Conf. on Distributed Systems Platforms (Middleware 2001). Heidelberg, 2001. 329?350.
    [20] Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 2004,22(1):41?53.
    [21] Rhea S, Geels D, Roscoe T, Kubiatowicz J. Handling churn in a DHT. In: Proc. of the 2004 USENIX Technical Conf. (USENIX). 2004. 127?140.
    [22] Papadopouli M, Schulzrinne H. Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices. In: Proc. of the ACM Symp. on Mobile Ad Hoc Networking & Computing (MobiHoc 2001). New York: ACM, 2001. 117?127.
    [23] Lindemann C, Waldhorst OP. A distributed search service for peer-to-peer file sharing in mobile applications. In: Proc. of the 2nd Int’l Conf. on Peer-to-Peer Computing. Washington: IEEE Computer Society, 2002. 73?80.
    [24] Lindemann C, Waldhorst O. Consistency mechanisms for a distributed lookup service supporting mobile applications. In: Proc. ofthe 3rd ACM Int’l Workshop on Data Engineering for Wireless and Mobile Access (MobiDE 2003). New York: ACM, 2003. 61?68.
    [25] Lindemann C, Waldhorst P. Exploiting epidemic data dissemination for consistent lookup operations in mobile applications. Mobile Computing and Communications Review, 2004,8(2):44?56.
    [26] Lau G, Jaseemuddin M, Ravindran G. RAON: A P2P network for MANET. In: Proc. of the 2nd IFIP Int’l Conf. on Wireless and Optical Communications Networks. 2005. 316?322.
    [27] Chawathe Y, Ratnasamy S, Breslau L, Lanham N, Shenker S. Making Gnutella-like P2P systems scalable. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2003. 407?418.
    [28] Pucha H, Das SM, Hu YC. Ekta: An efficient DHT substrate for distributed applications in mobile ad hoc networks. In: Proc. of the 6th IEEE Workshop on Mobile Computing Systems and Applications. Washington: IEEE Computer Society, 2004. 163?173.
    [29] Delmastro F. From pastry to CrossROAD: CROSS-Layer ring overlay for ad hoc networks. In: Proc. of the 3rd IEEE Int’l Conf. on Pervasive Computing and Communications Workshops. Washington: IEEE Computer Society, 2005. 60?64.
    [30] Castro M, Drushel P, Hu YC, Rowstron A. Exploiting network proximity in peer-to-peer networks. Technical Report, MSR-TR-2002-82, Microsoft Research, 2002.
    [31] Qiu TQ, Chen GH, Ye M, Chan E, Zhao BY. Towards location-aware topology in both unstructured and structured P2P systems. In: Proc. of the 2007 Int’l Conf. on Parallel Processing. Washington: IEEE Computer Society, 2007. 30.
    [32] Ratnasamy S, Handley M, Karp R, Shenker S. Topologically-Aware overlay construction and server selection. In: Proc. of the 21st Annual Joint Conf. of the IEEE Computer and Communications Societies, Vol.3. 2002. 1190–1199.
    [33] Xie HY, Krishnamurthy A, Silberschatz A, Yang YR. P4P: Explicit communications for cooperative control between P2P and network providers. In: P4PWG Whitepaper. 2007.
    [34] Xie HY, Krishnamurthy A, Yang YR, Silberschatz A. P4P: Proactive provider participation for P2P. In: Yale Computer Science YALE/DCS/TR1377. 2007.
    [35] Schollmeier R, Gruber I, Niethammer F. Protocol for peer-to-peer networking in mobile environments. In: Proc. of the 12th Int’l Conf. on Computer Communications and Networks. 2003. 121?127.
    [36] Gruber I, Schollmeier R, Kellerer W. Performance evaluation of the mobile peer-to-peer service. In: Proc. of the IEEE Int’l Symp. on Cluster Computing and the Grid. Washington: IEEE Computer Society, 2004. 363?371.
    [37] Hu YC, Saumitra MD, Pucha H. Exploiting the synergy between peer-to-peer and mobile ad hoc networks In: Proc. of the 9th Conf. on Hot Topics in Operating Systems-Volume 9. Berkeley: USENIX Association, 2003. 7. 附中文参考文献: [1] 黄宇,金蓓弘.非结构化P2P系统Overlay优化技术综述.小型微型计算机系统,2008,2:238?244.
    [6] 欧中洪,宋美娜,战晓苏,宋俊德.移动对等网络关键技术研究综述.软件学报,2008,19(1):126?140. http://www.jos.org.cn/1000- 9825/19/126.htm
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

李伟,徐正全,杨铸.应用于移动互联网的Peer-to-Peer关键技术.软件学报,2009,20(8):2199-2213

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 10,2008
  • Revised:April 27,2009
You are the first2035075Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063