On localized application-driven topology control for energy- Title efficient wireless peer-to-peer file sharing
Author(s) Leung, AKH; Kwok, YK
Citation Ieee Transactions On Mobile Computing, 2008, v. 7 n. 1, p. 66-80
Issued Date 2008
URL http://hdl.handle.net/10722/57457
©2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for Rights resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. 66 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 1, JANUARY 2008 On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing
Andrew Ka-Ho Leung, Student Member, IEEE, and Yu-Kwong Kwok, Senior Member, IEEE
Abstract—Wireless Peer-to-Peer (P2P) file sharing is widely envisioned as one of the major applications of ad hoc networks in the near future. This trend is largely motivated by the recent advances in high-speed wireless communication technologies and high traffic demand for P2P file sharing applications. To achieve the ambitious goal of realizing a practical wireless P2P network, we need a scalable topology control protocol to solve the neighbor discovery problem and network organization problem. Indeed, we believe that the topology control mechanism should be application driven in that we should try to achieve an efficient connectivity among mobile devices in order to better serve the file sharing application. We propose a new protocol, which consists of two components, namely, Adjacency Set Construction (ASC) and Community-Based Asynchronous Wakeup (CAW). Our proposed protocol is shown to be able to enhance the fairness and provide an incentive mechanism in wireless P2P file sharing applications. It is also capable of increasing the energy efficiency.
Index Terms—Topology control, wireless networking, P2P systems, file sharing, energy efficiency, fairness, incentive, network protocols. Ç
1INTRODUCTION
CCORDING to a recent survey [36], Peer-to-Peer (P2P) Since such a wireless P2P network is likely to be ad hoc Aapplications generate 1/5 of the total Internet traffic. It in nature, running P2P applications on top of it requires is believed that this trend will continue. Furthermore, an network developers to meet several research challenges. Internet Services Provider (ISP) solution company [32] First, “ad hoc P2P” means that users are allowed to join and reported that the hottest P2P applications are file sharing leave freely and, hence, a dynamic credit system is needed applications such as BitTorrent [3] (which occupies 53 per- to monitor the behavior of peers so as to monitor “free cent of all P2P traffic) and eDonkey2000 [7] (which occupies riders” [11] who do not contribute to the community. 24 percent). Apart from these wired P2P file sharing, some Second, in such an ad hoc P2P wireless environment, other wireless P2P applications have become part of our energy efficiency is, beyond doubt, a crucial factor in the daily life. For example, people can now play numerous P2P system design due to the fact that mobile wireless devices Java online games, which are compatible with mobile are inevitably energy limited. Indeed, it is challenging to phones so that players are allowed to interconnect in local tackle the energy efficiency problem of mobile devices in a area through Bluetooth, Wi-Fi, or wide area through 3G W- judicious manner, and it has intrigued researchers for years, CDMA or 3.5G HSDPA networks (for example, Nokia 6500s for example, [2], [31], and [30]. This motivates the need for a and 6500c, Sony Ericsson W910i, K850i, HTC TyTN II, and new energy-efficient topology control (TC) for effectively so forth) [13]. Indeed, in many metropolitan cities such as supporting P2P file sharing applications. Hong Kong and Tokyo, we can see that train commuters TC, in a traditional sense, comprises two components: routinely play wireless games among each other by using neighbor discovery and network organization [25]. In popular devices such as PlayStation Portables (PSPs). Now, neighbor discovery, one has to detect network nodes in its many mobile phones also already have 128-Mbyte or higher proximity and construct a neighbor set in which it could storage capability. Indeed, it is now a common practice to find possible next hops to establish communication link- have P2P file transfer through Bluetooth or Wi-Fi on mobile ages. On the other hand, network organization involves the phones and PDA. As such, wireless P2P file sharing is not decision of which communication links should be estab- only feasible but is also becoming pervasive. lished with neighboring nodes. Typically, it involves the use of power management schemes such as sleeping and transmit power control. The former disables some commu- . A.K.-H. Leung is with the Department of Electrical and Electronic nication links temporarily and the latter adjusts the Engineering, The University of Hong Kong, Room 807, Chow Yei Ching Building, Pokfulam Road, Hong Kong. E-mail: [email protected]. transmission range. In summary, traditionally, the objective . Y.-K. Kwok is with the Electrical and Computer Engineering Department, of TC is the preservation of network connectivity while Colorado State University, Fort Collins, CO 80523-1373. improving the efficiency of transmissions. However, we E-mail: [email protected]. believe that connectivity should be considered at the Manuscript received 8 Nov. 2005; revised 13 Sept. 2006; accepted 24 Apr. application level. Specifically, our suggested schemes are 2007; published online 14 May 2007. aimed at achieving an efficient connectivity among mobile For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TMC-0326-1105. devices in order to better serve the file sharing application. Digital Object Identifier no. 10.1109/TMC.2007.1077. Indeed, our idea is that the underlying network-layer (or
1536-1233/08/$25.00 ß 2008 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS Authorized licensed use limited to: The University of Hong Kong. Downloaded on June 5, 2009 at 05:17 from IEEE Xplore. Restrictions apply. LEUNG AND KWOK: ON LOCALIZED APPLICATION-DRIVEN TOPOLOGY CONTROL FOR ENERGY-EFFICIENT WIRELESS PEER-TO-PEER... 67 even link-layer) connections should be constructed in such 3OUR PROPOSED PROTOCOL a way that the file sharing application’s performance is In this section, we describe in detail our proposed improved. The metric that we use to judge performance is algorithms and their design rationale. Rather than suggest- the file request successful ratio. ing a new routing protocol concerned about finding a path The remainder of this paper is organized as follows: In between a sender and receiver, we focus on the question of Section 2, we discuss the background and related work on “who is my neighbor?” and the question of “when should i sleep P2P networking. In Section 3, we describe our proposed TC and wake up?” for each individual node. Indeed, our protocol. In Section 4, we describe the implementation proposed TC schemes can be used with any typical issues. In Section 5, we describe our simulation methodol- ad hoc routing algorithms. ogy. In Section 6, we present our simulation results and our interpretations. Finally, we provide some concluding re- 3.1 Overview marks in Section 7. As indicated in our brief survey presented in Section 2, many energy-efficient protocols have been proposed in the literature. Nevertheless, previous researchers usually ne- 2RELATED WORK glect the importance of considering the difference of There is a plethora of previous work related to the TC remaining energy levels between individual nodes. Indeed, problem. in the pioneering work of Singh et al. [31], it only uses The first category is TC for ad hoc wireless networks metrics for the total energy consumption in the whole path without any P2P concept [4], [5], [25]. The major focal points from server-peer (the peer who shares files) to client-peer of these previous results are energy efficiency and con- (the peer who requests files). nectivity. Some of these previous schemes can generate In ASC, we find out which nodes could be the next hop when a node has to communicate with another node which performance gains in terms of throughput and delay. Only is n hops away ðn 2Þ. Specifically, we consider that the [4] and [5] explicitly take fairness into consideration. construction of neighbor set is related to The second category is wired P2P, including P2P file sharing protocols. They are generally divided into three 1. contribution levels of different nodes in the P2P file classes: centralized P2P file sharing protocols [23], decen- sharing network, tralized unstructured P2P file sharing protocols [3], [8], and 2. the popularity of file resources owned by individual decentralized structured P2P file sharing protocols [28], nodes, [33]. Recently, a proximity-aware configuration of P2P 3. aggressiveness of the file-requesting node, and network overlay topology has also been extensively 4. the remaining energy levels of nodes. studied [15]. Most of these protocols are designed for file Our protocol not only takes energy efficiency into con- exchange or file searching in a wired network. Specifically, sideration but also controls the topology of the file sharing these protocols do not participate in constructing the link- network to introduce fairness. layer topology. In CAW, we form “virtual communities” among mobile The incentive of sharing files in P2P networks is another users. We define community as a set of two or more mobile important issue. One of the major research directions is the users that perform in a particular habit. For example, in a use of game theory to study the incentive problem [1], [12], music file sharing network, users with similar preferences [20], [38]. and fans of similar idols are recognized as members of the Sleeping is found to be a useful method to save the same “community.” Members from the same community energy of wireless nodes. There are two categories of “sleep- follow the same wakeup schedules. The rationale behind and-wake” protocols suggested in the literature: scheduled this is that file sharing is usually carried out between users protocol and on-demand protocol. Scheduled protocols include with similar interests (this is the usual reason that a sender the IEEE 802.11 Power Save Mode (PSM) in infrastructure owns the favorite file that the requester is asking for). Using community formation, we not only increase the chance of configuration [14], Power-Aware Multi-Access protocol getting a file but also allow a group of nodes to sleep and with Signaling for Ad Hoc Networks (PAMAS) [30], and conserve energy when other communities are active. sensor-medium access control (S-MAC) [37]. Two well- known examples of on-demand protocols are SPAN [5] and 3.2 “Who Is My Neighbor?”—ASC ASCENT [4]. Although the main function of routing protocols is to find Unfortunately, none of the previously suggested proto- out the appropriate path from the sender to the receiver, cols are designed for a wireless P2P system. Thus, we ASC constructs the next-hop set for each individual user consider an application-level-driven protocol for mobile wire- locally and gives this information to the routing layer to less P2P file sharing networks. The proposed protocol construct the path. No matter which routing protocol is consists of two components: Adjacency Set Construction used, the question is “Why does someone need to help the (ASC) and Community-Based Asynchronous Wakeup (CAW). source node to route the packets?” Our view is that, by ASC determines which neighboring nodes should be taking some factors into consideration, one can decide the included in the “adjacency set.” CAW groups users1 into worthiness of helping others to route their packets. Thus, “communities.” Members of the same community employ we propose ASC to address the issue. In the following, we the same sleep-and-wake schedule. first describe the system model. Consider a P2P file sharing application running on top of 1. We use “users,” “mobile devices,” and “nodes” interchangeably to a mobile wireless ad hoc network with N users. We denote mean wireless mobile devices. each user by ui and the set of users by U:
Authorized licensed use limited to: The University of Hong Kong. Downloaded on June 5, 2009 at 05:17 from IEEE Xplore. Restrictions apply. 68 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 1, JANUARY 2008
U u i 1; 2; 3; ...;N : 1 ¼f ij ¼ g ð Þ A relay has to first receive files from the server-peer, then We assume that there are in total M different file objects transmit the files to the client-peer, and both transmit and in the network: receive actions consume energy, whereas the server-node only transmits files and the client-node only receives files. F ¼ffjjj ¼ 1; 2; 3; ...;Mg: ð2Þ The final factor considered in our study is the remaining energy levels of nodes. As mentioned above, being a relay We use Ei to denote the remaining energy level (battery node requires more energy consumption than simply being level) of a mobile user ui. We then use a binary vector Vi to a client-peer (receives files) or server-peer (transmits files). denote the file objects that user ui possesses: It is obviously undesirable to ask a peer with a very low Vi ¼f ikjk ¼ 1; 2; 3; ...;vg;i¼ 1; 2; 3; ...;N;v¼ M; ð3Þ remaining energy level to be the relay node. Furthermore, it where is not enough to define a single threshold so that all peers with energy levels above the threshold act as relay nodes 1 If user i has file object fk and those with low energy levels only enjoy service from ik ¼ ð4Þ 0 If user i does not have file object fk: the high-energy peers, which is simply unfair. We thus propose the use of a relative metric; that is, if a node ui has a In this P2P file sharing platform, we quantify the higher energy level than a node u , then we consider that u popularity of each file object and represent it by using a s i is more eligible to be the next hop for u and it is also more weight with respect to a particular user. Different files are of s u u different levels of popularity in the network: Some file desirable for i to relay packets from s. objects (for example, latest pop music) are of higher ranking Now, we can formalize the above factors and define in the mind of some users. Thus, we represent the weight preference metrics to evaluate the worthiness of being an (rank) of an object fk in user ui’s mind by a weight wik. intermediate node to relay packets for the source node. We Different file objects could have different weight values for classify network activities into two types. The first type is different people. “public service,” where a node exchanges control packets Traditionally, network nodes transmit their packets to with other nodes for maintaining network infrastructure, the “neighboring nodes,” which are those nodes in close handling file searching query, helping in transferring files, proximity of the source node. However, our idea is that and so forth. The second type is “private service,” where a even if a node, say, ui, is within the transmission range of node downloads files from other nodes for its own use. the source node us, it is not a “must” that ui needs to be the The contribution metric is defined as next hop of us. Specifically, from an application point of i view, the neighbor node ui might refuse to be the next-hop Tpublic mcontrb ¼ ; ð5Þ data forwarder for us. T i In ASC, we define the adjacency set, AdjðsÞ, which i where Tpublic denotes the time duration in which node ui is represents the next-hop nodes of source node us, as: engaging in public service and T i is the time duration for u AdjðsÞ¼fui j dus!ui R ^ which i has joined this P2P network as one of the peers. Given this metric, we can allocate the relaying task more ui is willing to be the next hop of usg; evenly among all nodes. Nodes that have already provided where dus!ui denotes the distance between ui and us, and R public service for a long period of time can be excluded is the transmission range of us. from the adjacency set. As we have mentioned, we use Now, an interesting question is: “Is ui willing to be the “public service” and “private service” to classify network next-hop of us?” To answer this question, ui needs to activities. consider several factors. The first factor is fairness.Ifui To assess the aggressiveness of us, we define the metric has already helped a lot in routing packets for other nodes s and contributed in the maintenance of the P2P network for Tprivate magg ¼ ; ð6Þ a long time, then it is desirable to exclude ui in the T i adjacency set of us so that the relaying and routing task can T s u be more evenly distributed among all nodes. The second where private denotes the time duration in which s is engaging in private service. These two metrics use the factor is the aggressiveness of the source node us.Ifus always u u asks for files but does not contribute anything, then us is behavior of i and s known so far to predict the upcoming likely to be a selfish user, and this would reduce the traffic demand of ui and us. The service time can be easily willingness of other nodes to relay us’s packets. recorded by a local timer. As time goes by, these metrics The third factor is the popularity of file objects held by us. would be changed. Therefore, our protocol would update Apart from the aggressiveness of us, ui also needs to these values in a distributed manner to reconstruct the consider the expected number of files that will be downloaded adjacency set of us dynamically. from us.Ifus holds a large number of files or a smaller In a file sharing network, one of the most valuable number of popular files, then there can be many other peers resources is the file objects owned by network users. Some asking for files from us. Consequently, this would not only files are more popular and are requested more frequently occupy us’s bandwidth, but also create a burden for the by users. Indeed, work has been done on studying the neighbor(s) of us. The reason is that a neighboring node has relationship between the number of requests or number of to frequently route its packets outward. Moreover, being replica of a particular file in a P2P network and the this kind of relay node requires a double expense on energy: popularity of files [11]. Assume that we can give a rank r to
Authorized licensed use limited to: The University of Hong Kong. Downloaded on June 5, 2009 at 05:17 from IEEE Xplore. Restrictions apply. LEUNG AND KWOK: ON LOCALIZED APPLICATION-DRIVEN TOPOLOGY CONTROL FOR ENERGY-EFFICIENT WIRELESS PEER-TO-PEER... 69
Fig. 1. Zipf’s law and “(7, 3, 1) design” of the Wakeup Schedule Function (WSF). (a) Zipf’s law. (b) “(7, 3, 1) design” of WSF. X M f probðf Þ¼1 a file to represent its popularity. Then, according to the m 1 m X¼ Zipf distribution [19], M K 1 ) ¼ 11 K m¼1 m ð Þ probðfÞ¼ ð7Þ 1 r ) K ¼ P : M 1 for some constant K and is close to unity, which means m¼1 m that “the probability that a file searching query is Thus, the File Popularity Metric can be defined as associated with the rth most requested file is inversely P proportional to its rank value.” For example, the most 1= M 1 m ¼ m¼1 m : ð12Þ popular file ðrank ¼ 1Þ would be the file most probably popu rs requested since the denominator of the fraction in (7) would be of the smallest value. This is known as the Zipf’s This probability is calculated based on the average rank of law: The probability of occurrence of an event e (denoted files held by us and it serves as a measure on the chance by probðeÞ) as a function of its rank r (determined by the that a file searching query is associated with us. frequency of occurrence) is a power-law function (see Finally, we define the energy metric as Fig. 1). Ei Here, we assume that equals 1. Our protocol uses the meng ¼ ; ð13Þ basic form of Zipf’s law. If a more accurate value of is Es provided by network statistics, then the accuracy of CAW where Ei and Es denote the remaining energy levels of ui can be further improved: and us, respectively. A larger value of the expression represents a higher preference for u to act as the next logðprobðeÞÞ¼ logðrÞþlogðKÞ: ð8Þ i hop of us. Based on our assumption that equals 1, we estimate A larger value of the aggressiveness metric means that that, if a user holds a larger number of popular files, then the source node is likely to be a free rider and does not this peer is more likely to be a server-peer. Consequently, deserve other nodes to relay too much traffic for it. Finally, more energy would be required for being the relay node of a larger value of the File Popularity Metric means that the this node. Let ri be the average rank of the file objects held source node has a higher expected level of outgoing traffic. by user (node) ui: All these three cases reduce the intention of other nodes to P be the relay node. On the other hand, a higher energy level J 0 r ðfjÞ of ui makes it preferentially the next hop of us. r ¼ j¼1 ; ð9Þ i J Now, we refine the definition of adjacency set as 8 8 9 r0ðf Þ f J > > > where j denotes the rank of file j and is the total <> <> mcontrb <