Đề tài Trackerless bittorrent adapted to mobile ad hoc networks

Tài liệu Đề tài Trackerless bittorrent adapted to mobile ad hoc networks: VIETNAM NATIONAL UNIVERSITY, HANOI UNIVERSITY OF TECHNOLOGY AND ENGINEERING Khanh Toan Do TRACKERLESS BITTORRENT ADAPTED TO MOBILE AD HOC NETWORKS GRADUATION THESIS Faculty: Information technology HA NOI – 2010 HA NOI - 2010 VIETNAM NATIONAL UNIVERSITY, HANOI UNIVERSITY OF TECHNOLOGY AND ENGINEERING Khanh Toan Do TRACKERLESS BITTORRENT ADAPTED TO MOBILE AD HOC NETWORKS GRADUATION THESIS Faculty: Information technology Instructor: Dr. Dai Tho Nguyen HA NOI – 2010 HA NOI - 2010 Abstract Of the many P2P file sharing prototypes in existence, BitTorrent is one of the few that have managed to attract millions of users. It is known to perform very well over wired networks where end-to-end performance is almost guaranteed. However, in mobile ad hoc networks (MANETs), BitTorrent with its default configuration hardly leads to the best performances because of appearance of many constraints such as the scarcity of resources and their shared nature....

pdf47 trang | Chia sẻ: hunglv | Lượt xem: 1123 | Lượt tải: 0download
Bạn đang xem trước 20 trang mẫu tài liệu Đề tài Trackerless bittorrent adapted to mobile ad hoc networks, để tải tài liệu gốc về máy bạn click vào nút DOWNLOAD ở trên
VIETNAM NATIONAL UNIVERSITY, HANOI UNIVERSITY OF TECHNOLOGY AND ENGINEERING Khanh Toan Do TRACKERLESS BITTORRENT ADAPTED TO MOBILE AD HOC NETWORKS GRADUATION THESIS Faculty: Information technology HA NOI – 2010 HA NOI - 2010 VIETNAM NATIONAL UNIVERSITY, HANOI UNIVERSITY OF TECHNOLOGY AND ENGINEERING Khanh Toan Do TRACKERLESS BITTORRENT ADAPTED TO MOBILE AD HOC NETWORKS GRADUATION THESIS Faculty: Information technology Instructor: Dr. Dai Tho Nguyen HA NOI – 2010 HA NOI - 2010 Abstract Of the many P2P file sharing prototypes in existence, BitTorrent is one of the few that have managed to attract millions of users. It is known to perform very well over wired networks where end-to-end performance is almost guaranteed. However, in mobile ad hoc networks (MANETs), BitTorrent with its default configuration hardly leads to the best performances because of appearance of many constraints such as the scarcity of resources and their shared nature. There are several researches proposing solutions to adapt BitTorrent to MANETs but still too few studies seek to combine the research ideas in these two areas together. Therefore, in this thesis, we propose to improve the original BitTorrent by combining a presence detection mechanism for MANETs with the BitTorrent downloading mechanism to achieve better performances. With the help of extensive NS-2 simulations, we show that these enhancements to BitTorrent significantly improve the file completion time while fully profiting from the incentives implemented in BitTorrent to enforce fair sharing. Acknowledgements First, I would like give my sincere thank to my instructor, Dr. Dai Tho Nguyen, Department of Networks and Computer Communications - who has give me guidance and support during the time I work on this thesis. Next, I would like to thank the University of Technology and Engineering - Hanoi National University, the school that has given me a perfect environment to study and train myself for four years. Finally, thanks to my family and friends who have always supported and encouraged me a lot throughout my student life. They were, are, and will be the endless source of encouragement, ambition of my life. Ha Noi, June 2010 Khanh Toan Do TABLE OF CONTENTS INTRODUCTION..................................................................................................................1 CHAPTER 1: PEER TO PEER NETWORKS ...............................................................3 1.1 Overview .........................................................................................................................3 1.2 Definitions.......................................................................................................................3 1.3 Comparison with client/server architecture ................................................................4 1.4 Benefits and weaknesses of P2P networks .................................................................5 1.5 Classifying P2P networks .............................................................................................6 1.5.1 Pure P2P networks ..................................................................................................6 1.5.2 Hybrid P2P networks ..............................................................................................7 CHAPTER 2: BITTORRENT FILE SHARING SYSTEM .......................................10 2.1 Overview .......................................................................................................................10 2.2 Benefits of the BitTorrent protocol............................................................................11 2.3 Limitations ....................................................................................................................13 2.4 Comparison with other file sharing protocols ..........................................................13 2.5 Original BitTorrent for wired networks ....................................................................14 2.5.1 Description .............................................................................................................14 2.5.2 Operation .......................................................................................................................15 2.5.3 Creating and publishing torrents .........................................................................16 2.5.4 Downloading torrents and sharing files..............................................................17 2.6 BitTorrent variant for wireless ad hoc networks ......................................................18 2.6.1 Trackerless BitTorrent ..........................................................................................18 2.6.2 Packets exchanged between peers.......................................................................18 2.6.3 Downloading mechanism .....................................................................................19 2.6.4 Selecting a neighbor at random ...........................................................................20 2.6.5 Piece selection strategy.........................................................................................21 2.7 Performance metrics ....................................................................................................21 CHAPTER 3: AN IMPROVEMENT OF BITTORRENT ADAPTATION TO MANETS ................................................................................................................................24 3.1 General ideas ................................................................................................................24 3.2 Node presence detection mechanism.........................................................................24 3.2.1 Soft state bloom filter ...........................................................................................25 3.2.2 Bloom filter operations .........................................................................................26 3.2.3 Decoupling information decay and BEACON Intervals ..................................27 3.3 Integration of node presence detection mechanism into BitTorrent ......................28 3.4 Conclusion ....................................................................................................................30 CHAPTER 4: SIMULATION RESULTS ......................................................................31 4.1 Network simulator (NS-2) ..........................................................................................31 4.2 Main scenario ...............................................................................................................31 4.2.1 Estimate the average finish time..........................................................................34 4.2.2 Estimate the average sharing ratio ......................................................................35 4.2.3 Estimate the network traffic .................................................................................36 4.2.4 Impact of the number of network nodes .............................................................37 CONCLUSIONS AND PERSPECTIVES ......................................................................38 REFERENCES .....................................................................................................................39 TABLE OF FIGURES Figure 1: P2P network ............................................................................................................4 Figure 2: A pure P2P network ...............................................................................................7 Figure 3: A hybrid P2P network ...........................................................................................8 Figure 4: An example of the BitTorrent file sharing system ...........................................11 Figure 5: A soft state Bloom filter ......................................................................................25 Figure 6: Update Bloom filter .............................................................................................27 Figure 7: Problem when updating Bloom filter ................................................................28 Figure 8: Flowchart of new implementation .....................................................................30 Figure 9: Network topology.................................................................................................33 Figure 10: Average finish time for our enhanced BitTorrent compared to ordinary BitTorrent with limited neighborhood .................................................................................34 Figure 11: Average sharing ratio for our enhanced BitTorrent compared to ordinary BitTorrent with limited neighborhood .................................................................................35 Figure 12: Number of control packets sent between 2 versions .....................................36 Figure 13: Average finish time for N = 30, 40 and 50 .....................................................37 TABLE OF ACRONYMS DSDV Destination-Sequenced Distance Vector FNT Far Neighbor Table HTTP Hypertext Transfer Protocol ID Identifier IP Internet Protocol MAC Media Access Control MANETs Mobile Ad Hoc Networks NNT Nearby Neighbor Table P2P Peer to Peer PDA Personal Digital Assistant TCP Transmission Control Protocol TTL Time To Live UDP User Data Protocol 1 INTRODUCTION MANETs and P2P file sharing systems are two areas that have long been studied based on a same principle: P2P paradigm. This paradigm aims to build the services of large-scale distributed systems without any infrastructure. In this model, users have an equal role. Global services are guaranteed thanks to the collaboration of users with each other. For wireless ad hoc networks, the network is a collection of wireless nodes without any central control or any base station. The network node acts as both router and host. Multi-hop routing method is used to ensure connectivity between nodes. For P2P file sharing applications, peers work together to share data and multimedia content. Each participating node will share a portion of its upload capacity to serve other nodes. The global productivity of the system increases exponentially with the number of nodes involved. Gnutella, Freenet, and BitTorrent are examples of P2P file sharing applications on the Internet. Both the file-sharing applications and ad hoc networks are all long been studied. They have been studied very much, but are independent of each other. Only very few studies try to find out if they work well together. These studies only focus on finding contents in MANETs without attention to the efficiency of content sharing. Studying the performances of file-sharing applications on mobile ad hoc networks is really challenging because of wireless channels’ diverse constraints. In fact, when the peers play a role of both routers and end users, then the routing overhead must be considered. Moreover, the performance of the transport layer protocol such as TCP decreases markedly when multi-hop paths are used. That is why file-sharing applications are not expected to work well when deployed on mobile ad hoc networks. Designing an efficient solution for the file sharing problem in wireless ad hoc networks is an important part of our study. In this work, we try to develop a file sharing application for wireless ad hoc networks. My aim is to come up with solutions that reduce the content download time while at the same time improving the distribution ratio in the network by enforcing fair sharing among peers. As efficient and fair content sharing is targeted, we choose BitTorrent given its large usage. We are interested in two main parts of the BitTorrent protocol, which are node discovering and downloading mechanisms. 2 The main framework of our study is based on [8], but the solution proposed in this paper still contains some problems with its node discovery mechanism: - Cannot detect if a node has left the network or not. - Node discovery mechanism need too much time. Because of these limitations, we replace the old presence detection method with another one introduced in [3]. The performances of our approach are proven through the ns-2 simulator to be better than the one in [8]. The remaining of this thesis is divided into 4 chapters:  Chapter 1: P2P networks We present an overview of P2P networks, their architecture, benefits and disadvantages.  Chapter 2: BitTorrent file sharing system This chapter describes about BitTorrent protocol and its installation over wired networks and mobile ad hoc networks  Chapter 3: An improvement in BitTorrent on MANETs Here is the main part of this thesis, which offers an innovative solution to BitTorrent over MANETs.  Chapter 4: Simulation results The last chapter shows the results of our simulation, in order to check the correctness arguments made above.  Conclusion and perspectives In this section, we draw a summary of our work and some plans to do in the future. 3 CHAPTER 1: PEER TO PEER NETWORKS In this chapter, we will present an overview about peer-to-peer networks, some definition related, advantages and weaknesses of them. 1.1 Overview The trend of global economy has many changes today; the organizations are working to find ways to improve the speed of their computer without having too much capital investment for hardware and software. Many computers are idle in almost time, and these machines have a great amount of disk capacity that is not used. The next step is to maximize the use of the machine. Peer to peer network model is a solution to this problem. In a P2P network, computers can act as both clients and servers. The role of these computers, depending on the task, will be identified when they perform. For example, computer A sends a request file to computer B. During file transferring, computer B is a file server and A is a client computer. At the time after, Computer B can send a request to computer A, and the roles are reversed now. This model can reduce the overload at the server and maximize network performance. P2P model allows us to use the combined strength in the network. It helps organizations handle major computing tasks that previously could not solve. P2P networks also bring benefits to small companies and even individuals. 1.2 Definitions Peer to peer (P2P) network is a computer network in that network operation relies heavily on computing power and bandwidths of the computers involved but not focus on a small number of central servers as the original networks. P2P networks are often used to connect the computer via an ad hoc type of connections. P2P networks have many applications. The most frequently encountered application is file sharing, as all forms of sound, images, data... or real-time data transmission such as VoIP phones [6]. There are various P2P definitions, but none of them is widely recognized. However, there are some general characteristics belong to P2P network: - Peer (node): is a computer can act as both client and server. It plays a certain role according to the needs of the system under a specific time interval. In a P2P network, a 'peer' can work simultaneously as a server and client. The 4 Peer can exchange resources between them immediately. Resources include files, disk capacity, information processing capabilities and knowledge. - Dedicated server may or may not be made in the P2P network according to the type of application. However, the role of the most dedicated server is to facilitate the peer to discover each other, they role-play as the broker. P2P network without a dedicated server is sometimes described as a pure P2P network. - Peer can join and leave the network freely. - Peer can join different networks. P2P network may have several million peers. - Peer is not necessarily a computer; it can be a mobile device such as mobile phone, PDA or a computer. 1.3 Comparison with client/server architecture Figure 1: P2P network There are 3 main differences between P2P systems and client/server model: - Network components (nodes): For client/server is the server or the client. It is different in the P2P model is the peer. Each peer can act as both server and client just play. 5 - Physical structure of nodes: For client/server, the server with advanced features and client is often the personal computer. While in the P2P networks, peers have equal roles but their physical structures necessarily are the same. They may be desktops, laptops, servers, mobiles or pagers... - Transmission line: In client/server model, only the transmission between client and server, but for the P2P model, all traffic between network nodes together. 1.4 Benefits and weaknesses of P2P networks Since its appearance, p2p network has created a new file-sharing movement thanks to its benefits: - In P2P networks, clients provide resources, which may include bandwidth, storage space, and computing power. As nodes arrive and demand on the system increases, the total capacity of the system also grows up. - It takes very little time to complete a task without having to have a proper server, while client/server model can lead to congestion in the network. - There are many computers, which do not use their total power. For example, the office computers are not used from 5p.m until 8a.m the following day. Peer computers on P2P network can use these resources and make them up. - New device can be added to the network easily. Therefore, the network scalability is very high. - P2P networks will still work when some network devices do not work. Users can join or leave the network whenever they want, so the user retains controlling of their resources. Although P2P networks offer many benefits, but they are not a drug for every problem pressing diseases. P2P networks cannot be a good choice in some cases. We can list out the following drawbacks: - Hackers can attack the peers easily. - It is difficult to have a mandatory standard in P2P networks because many members will be connected together with many different protocols in the network. - A peer may leave the network arbitrarily. A P2P network cannot guarantee that the resource is always available. For example, a user can turn off or remove a file, so it is difficult to predict before the performance of a system. 6 - It is difficult to prevent the download and upload of illegal software within the system. - A popular peer networks can generate a large amount of network traffic. Example, P2P network Napster used to make the network access speed reduced. Many universities do not allow their students accessing to Napster inside the school. 1.5 Classifying P2P networks Until recent times, the P2P file-sharing applications are usually applied in one of two main models: pure model and hybrid model. 1.5.1 Pure P2P networks In the pure models, nodes have the same roles, capabilities and responsibilities. Communications between the nodes is symmetric in the sense that each node can both play the role act as both client and server. There is not existence of a defined client/server relationship between the nodes. The program runs on each node must perform the functions of the client and the server. Because of no control mechanisms and centralized management so that the most difficult problem pure networks model faces is detecting and locating the file in the network. Gnutella applies the mechanism to promote communication: when a node receives the query and cannot find files on your machine, it will forward the search message to all neighboring node. Obviously, this method will not ensure proper operation in a large network, which has many nodes. With Freenet, file-searching mechanism has been improved through the ability selecting the neighbor node to send a message. However, the algorithm used to select neighbors is not simple. 7 Figure 2: A pure P2P network 1.5.2 Hybrid P2P networks As we know the difficulty in locating, searching for files is the biggest drawback of the pure P2P network. The cause of this difficulty comes from the nature of it completely decentralized. It has proposed a new model to reduce this problem by bringing centralized elements to the network. One or more nodes will act as special. They are used to provide information regarding the location of the files in the network instead of being used to store files directly. The special node called the searching server. When a node wants to find files shared on the network, it will send a query to searching servers. Returned from the searching server for the node will find a list of files associated with the node address on the network. Then the node can connect directly to one another to begin file transfer. There is a combination of client/server and P2P architecture. Interaction with the searching server node comply client/server architecture, while exchange files between the nodes is P2P. Therefore, we call this as hybrid model. Napster and BitTorrent are typically file-sharing applications based on hybrid model. Their server does not directly in storing data, but only contains information about the location of files shared on the network. 8 Figure 3: A hybrid P2P network Because this model is the combination of client/server and P2P architectures, should be able to see that the hybrid model contains both advantages and disadvantages of the two architectures. Centralized calculating in files positioning function can lead to overloading the server when the network is looking to expand, and there are many nodes involvement. In return we have a more quickly and more efficiently searching mechanism. The nature of P2P interaction directly between the nodes that still offers significant advantages through utilization of network resources. But here arises a problem concerning the organization of storage the information about the location of the file shared on network. Usually they organize the information into a database. Each record includes a file with file name and address of the node currently hosting the file. This is a popular way to organize applications using P2P file-sharing hybrid model like Napster or OpenNap. However, limitations of this method is that it only allows users to search by file name (or general file identifiers). This is suitable only for sharing music file or photo libraries. With more complex libraries of documents related to the character (text files, books, articles, ...), demand does not stop from looking at the name or identity criteria. Currently almost all file-sharing applications commonly found on the web do not allow to search features of the content within document files. It can be seen that to put this searching feature function into a file-sharing applications, we found it necessary to apply the methods and techniques used in information retrieval . When that information about the documents not only of 9 the name (identification) of documents but also include further information on the keywords contained in the document. Information on the searching server must be organized as a system indexing by keyword. 10 CHAPTER 2: BITTORRENT FILE SHARING SYSTEM In this chapter, we present an overview of the BitTorrent file sharing system and its implementation over wired networks and mobile ad hoc networks. 2.1 Overview File sharing is very well known in the entire community due to its popular usage. A large amount of bandwidth on the Internet is used by different file sharing applications/protocols. It has been estimated that it may account for as much as 43% of all Internet traffic (depending on geographical location) as of February 2009[14]. BitTorrent is one of the most popular protocols for transferring large files. There are many famous applications using BitTorrent protocol such as uTorrent or Podcast. Besides legal distribution of files, BitTorrent is often used to illegally share and download copyrighted material. The technology within the protocol makes it possible to distribute large amounts of data without the need of a high capacity server, and expensive bandwidth. This is probably the main reason for using this protocol instead of using traditional downloading from HTTP or FTP servers. For those sharing and downloading copyrighted files, BitTorrent is profitable because it is decentralized. 11 Figure 4: An example of the BitTorrent file sharing system 2.2 Benefits of the BitTorrent protocol The BitTorrent protocol helps to improve the previous generation of P2P software with a number of significant initiatives, which shall be discussed in next subsections. High speed downloading Simply put, BitTorrent is quite popular due to its parallel file transfer process. Unlike the typical network behavior, which bottlenecks cause performance to plummet; BitTorrent actually increases the demand to improve the performance of a computer network. This behavior increases the stability ratio for the distribution of large, popular content on the internet, for servers of limited capacity. The protocol achieves this by splitting large files into smaller blocks, such as 128 kilobytes, by splitting into blocks, the source components may be required from many sources, but 12 not need to set the complete file to be able to load up the block, which means downloading the software can quickly start contributing as uploaders for other users Simplicity, easy to use Unlike other complex previous P2P protocols, the BitTorrent protocol works on a web based distribution model built over the HTTP protocol. Users simply download a client, which to a user act as an extension of their internet browser. By opening the files ‘.Torrent’, client will allow the users to save files to a location of their choice on the hard drives in the same fashion as original file transfer applications. Until the user closes the client, BitTorrent will continue sharing the file to other clients. Effective use of limited upload bandwidth Home broadband connections have quite limited upload bandwidth available is a big problem of P2P systems. To solve this, the BitTorrent protocol uses a few mechanisms to mitigate for this problem. When a client has received a few initial blocks, it can then use its upload bandwidth to forward those blocks to other machines. Another aspect is that transfers are limited to four open sessions, and the number of files hosted is limited to a few users; by focusing on a small number of activities, the network can reduces overhead. By reducing the number of uploads per machine, and having considerably more machines uploading content, the time required by a client for downloading a large file is considerably less than tr aditional means. Overcoming the Free-Rider problem In typical P2P systems, the performance of the overall system downs when users trying to obtain service without contributing anything to the system. This is an old problem, and BitTorrent was designed with an approach of local optimization by allocating the most upload bandwidth to peers, which are supplying the greatest amount of content. Because of the design of the current BitTorrent Protocol, free riders can only get 20% of the total system bandwidth. High content integrity BitTorrent employs two mechanisms, which make it more reliable. First, to be accepted on a file tracking server, typically new content must be accepted and managed by moderators who manually inspect it. To reduce the overload for moderators, regular suppliers of content can be promoted to immoderate submitters 13 after gaining enough trust. Once the original content is considered trusted, a validation checksum of file will be presented from the server to guarantee the content integrity. 2.3 Limitations BitTorrent protocol does not help users to hide their identifiers. Because the tracker maintains a list of files being shared, it also contains a list of IP addresses of the computers are downloading the file, and the list of the files that have been downloaded previously. Based on the BitTorrent protocol also ascertains the address of the peer in the swarm and of course, the peer can be attacked. Another disadvantage of the BitTorrent protocol is less encouraging peer into seeder after file downloading is complete. Consequently, seeders and peers in swarm will disappear gradually, which means that more older torrents to download the file, then the probability of success lower. BitTorrent has the advantage in the broadband environment, such as DSL, cable, satellite ... but for dial-up Internet users using the BitTorrent protocol will not work, because dial-up connection or disconnection and speed not load high. 2.4 Comparison with other file sharing protocols The method used to distribute files between eDonkey2000 and BitTorrent networks is similar, but the clients in the eDonkey network usually share and download many files, making the bandwidth per carrier becomes less. In contrast, transporting in BitTorrent is much faster by focusing on a file or a specific group of files. Original eDonkey2000 protocol provides very little resistance to fraud machines (download more, upload very little), the new version of eDonkey2000 client has installed the system which encourages more uploads. For example, systematic program eMule (credits system) have a score system to encourage uploaders. One client will prioritize the shipment to its previous position by moving the client to the top of the queue to wait for less time. This system proved effective because a queue for each client using eMule often has hundreds, even thousand entries. KaZaA is a protocol similar to BitTorrent protocol, but it has another point that is its distinguishing workstations by dedication level (Participation Level). Contribution level increases when you upload and decreases when you download. Once you upload a resource, it devotes to the person with the highest-level first and then this person devote to the lower contribution level one and so on. This model is similar to the pyramid model; the most uploader is at the top position of the pyramid, 14 and the less one is on the bottom. KaZaA is only appropriate model distribution of resources for a large number of users, it has been shown that the file at the bottom of the pyramid can be downloaded faster than on the case by means of HTTP (in the case file is large). Nevertheless, KaZaA has a small downside is that it believes the report of the workstations on the level of dedication, so clients can cheat with a lot of dedication for the workstation which is not official. 2.5 Original BitTorrent for wired networks 2.5.1 Description BitTorrent protocol defines a method to disseminate and share files online. Before having BitTorrent protocol, there were some P2P protocols, which allow a computer in the network to share files with other computers without having a centralized server. BitTorrent is an improvement from the previous P2P protocol. BitTorrent protocol has a principle to work closely with the ability to customize, reliable and cost of maintaining a list of computer file sharing better than the previous P2P protocols. Because of communication following standard TCP/ IP, BitTorrent protocol can operate on regular Internet connection [10]. BitTorrent protocol, which allows users to distribute large amounts of data without depending much on their computers, would be needed for standard Internet hosting. This protocol works as an alternative data distribution method that makes even small devices (e.g. mobile phones) with low bandwidth capable of participating in large data transfers. BitTorrent client is a program operating under the BitTorrent protocol. Each BitTorrent client can compares, requirements, and transports files on the network using the BitTorrent protocol. Files can contain any information, including text, audio, video and encrypted content. First, a user playing the role of file-provider makes a file available to the network. This first user's file that is called a seed allows other users, called peers, to connect and start to download the file. When new peers connect to the network and request the same file, their computer gets a different piece of the data from the seed. Once multiple peers have multiple pieces of the seed, each of them becomes a source for that continuously distributes the file. The effect of this is to reduce the dependent on the initial user and distribute the file download task among the seed and many peers. With BitTorrent, there is no need to provide a computer data quantities, which could jeopardize the task by overwhelming all resources, but the same result is still reached: each peer eventually receiving the entire file. 15 After the file successfully and completely downloaded, the peer can shift roles and become an additional seed, helping the other peers to get the whole file. This eventual change from peers to seeds determined the number of times a file is available in its complete form. This distributed nature of BitTorrent leads to spread the file throughout peers. As more peers join the swarm, the likelihood of a successful download increases. Compared with standard Internet hosting, this reduces the original distributor's hardware and bandwidth resource costs significantly. It also reduces dependence on the original distributor and provides a source for the file, which is generally temporary and therefore more difficult to trace than providing by the long-term availability of a server in standard file distribution techniques. 2.5.2 Operation BitTorrent greatly reduces the load on the server, since users usually download files between them, not the server. As shown by the colored bars below each client, the file is downloaded in a random order, instead of carrying a sequential order. Unlike the systems of traditional file sharing, its main objective is to provide an efficient way to distribute a single file to a large group of people, forcing all those who download a file to share it with others. First is distributing by conventional means a small file with a. torrent. This file is static, so often found on websites or distributed via email. The file 'torrent' contains the address of a "search server", called tracker, which is responsible for locating potential sources for the file or part thereof. This server is really centralized and it provides statistics on the number of transfers, the number of nodes with a full copy of the file and the number of nodes that have only a portion thereof. The library file or files you want to download from the sources found by the tracker, and at the same time as the download, it starts to climb parts of the file available to other sources, using the bandwidth allocated to it. Since the action of sharing begins even before completing the download of a file, each peer will inevitably contribute to the distribution of this file. The system is responsible for rewarding those who share more, the higher the bandwidth the greater the number of connections to discharge peers to be established. When a peer starts downloading a file, BitTorrent does not necessarily come at the beginning of the file, but is low in parts at random, after peers are connected to 16 download the file. If the peers are available online each part of the whole file (even if they are scattered), eventually every peers will get a full copy of it. Of course, initially one must have the complete file to begin the process. This method produces significant improvements in transfer rate when many users connect to download the same file. Where there is not any node with having complete file ("seeder" or "seed") connected to the tracker, the possibility exists that the file cannot be completed. 2.5.3 Creating and publishing torrents The peers that are distributed over the network treat the file as a separation of it in a number of identically sized pieces, typically between 32 KB and 4 MB each. Each peer performs a checksum (checksum) for each part, using the SHA-1 algorithm, and storing it in the torrent file. Parts greater than 512 KB will reduce the size of a torrent file for each payload, but this would reduce the efficiency of the protocol. When another peer later receives a particular piece, the hash of the piece is compared to the recorded hash to check that is free from error. Peers that provide complete files be called seeds (seeders) and the peer that provides the initial copy of the file is called initial seed (initial seeder). The exact information that is contained in the torrent file depends on the BitTorrent protocol’s version. By convention, the name of a torrent file has the extension ".torrent". Torrent files have a section called "announce", which specifies the URL of the tracker, and "Info" section, which contains the names of the files, their sizes, length of piece used, and SHA-1 hash code for each of the pieces, all this information is used by clients to verify the integrity of the data received. Once completed torrents files are posted on a website or elsewhere, and are registered with an origin server, which is called a tracker, it keeps the list of clients who are currently participating on the torrent file. Alternatively, in a decentralized system, each peer acts as a tracker. BitTorrent clients such as μTorrent, BitComet, KTorrent and Deluge, implement this, using methods of Distributed hash table (DHT). Azureus also supports tracing method is incompatible nodes (April 2007) with the DHT that offers its customers [2]. Once DHT has passed, a "private" flag like broadcast flag was unofficially announced, telling clients to restrict the use of decentralized monitoring whether the user desires. Flag is intentionally placed in info section so it cannot be disabled or 17 removed without changing the identity of the torrent. The purpose of the flag is to prevent torrents from being shared with clients without access to tracker. The flag was requested to be included in the formal specification in August, in 2008, but it has not been accepted. 2.5.4 Downloading torrents and sharing files Using any Internet browser, like Firefox, browse the site has a list of torrents, download it then use BitTorrent client open out there. After opening the torrent file, BitTorrent will connect to the trackers, the trackers will give it a list of the peers are downloading this file. A group of members (or peers) of a BitTorrent network which download the same file is called the swarm. When the client connects to the swarm, it will start sharing files with each other. The clients will share the pieces together instead of sharing direct with the trackers, so the number of clients in the swarm can develop very quickly. In BitTorrent network, each of clients shares some of its resources such as data, upload bandwidth with other peers interested in the same content in order to go up the global system capacity. Peers participating to download the same content form a torrent. A peer discovers other peers by contacting a central rendezvous node called tracker. The latter store IP addresses of all peers in the torrent and manage statistics of uploader and downloader on network. To make the replication of the content in the network easier and to guarantee multi-sourcing, a file is subdivided into a set of pieces. Then, each piece is also subdivided into blocks. Seed (seeder) is a peer, which has all pieces of the file. When the peer is still downloading pieces, it is called leecher. The neighbors of a node are contained in a peer list which it can open a TCP-connection to exchange data and information. Only four simultaneous outgoing active TCP connections are accepted by the protocol. These neighbors are called effective neighbors. They are chose by the BitTorrent’s choking algorithm. This algorithm is performed periodically. When the choking period expires, a peer chooses to unchoke the 3 uploaders to him at the highest rate. It is a best slot unchoking. This strategy, called tit-for-tat, ensures reciprocity and enforces collaboration among peers. Now to discover new upload capacities, a peer chooses randomly the fourth peer to unchoke. This slot is called optimistic slot. All other neighbors are left choked. Once unchoked, a peer chooses a piece to download using a specific piece selection strategy that is called local rarest first. Indeed, each peer maintains an update-to-date list of pieces owned by all its neighbors. When choosing a piece, a peer selects the piece with the least redundancy in its neighbors. One of the rarest pieces is selected randomly in case of equality. Rarest first is supposed to grow up the entropy of pieces in the network that enforces cooperation and hence improves global performance [14]. 18 2.6 BitTorrent variant for wireless ad hoc networks Some works have tried to adapt to the BitTorrent network to MANETs (eg, [1] and [13]). They focus only improved phase detection node without resolve to improve the efficiency of content sharing. Michiardi et al [7] study in the performance of a cooperative mechanism for distributing content from a source to a destination of great potential. They propose to implement a small change BitTorrent that allows detection neighbors and local traffic. This is done by selecting only close neighbors as effective neighbors. The result is a decrease in download time and total energy consumption. However, this below solution goes further by focusing not only on download time, but also on the sharing between peers. 2.6.1 Trackerless BitTorrent According to the feature of MANETs that peers themselves linking into a network, a centralized tracker cannot install. To adapt BitTorrent over wireless ad hoc network, we need a new mechanism to replace tracker's role: discovering and identifying the other peers. M.K Sbai gave a method using HELLO message to solve such problem [8]. To discover new peers, a peer floods periodically a HELLO message to the network and waits for HELLO REPLY messages. These HELLO messages are forwarded to the other neighbors with some initial TTL (Time-To-Live) to control the scope of the flood and hence the visibility of a peer. Receiving a HELLO message, a peer decreases the TTL and forwards it to its wireless neighbors, and so on until its TTL reaches zero. 2.6.2 Packets exchanged between peers There are 2 types of packets exchanged in the network: Data packets and control packets. We choose to send data packets via TCP connections because TCP provides reliability and congestion controls needed to transfer blocks of file. Control packets such as HELLO message (or BEACON message in new version) and piece updates are better when using UDP. Here are the control packets exchanged between peers: - HELLO: see section 2.6.1 - HELLO REPLY: see section 2.6.1 - UPDATE PIECE LIST: when a peer receives a new piece, it sends an UPDATE PIECE LIST to all peers with whom it can exchange data. 19 - PIECE OFFER REQUEST: when a peer i unchokes a peer j, it sends a PIECE OFFER REQUEST packet to j. This packet contains the list of pieces that i has already downloaded. - PIECE OFFER REPLY: receiving a PIECE OFFER REQUEST, a peer sends a PIECE OFFER REPLY packet to the sender. A flag included in this packet indicates the offer being accepted or not. 2.6.3 Downloading mechanism To profit from the advantages of the limit neighborhood, M. Sbai gave an idea that modified the original BitTorrent to adapt to MANETs [8]. A few TCP connections are created to distant peers in addition to those with close peers. Pieces can then spread over the network and they will be propagated in different directions, which improve the sharing ratio and the download completion time. Therefore, several zones of the network can be active simultaneously, which makes the network becoming more dynamic. The new choking algorithm is used by utilizing routing information. It distributes optimistic unchokes between distant and close peers and adds a specific neighbor selection mechanism to choose a remote peer. It also applies a new piece selection strategy when the distant peer is offered. Unlike regular BitTorrent with limited neighborhood, this method requires a global knowledge about the identifiers of peers in the network. In the modification BitTorrent, each peer maintains 2 tables: NEARBY NEIGHBOR TABLE (NNT) and FAR NEIGHBOR TABLE (FNT). One and two hops neighbors will are added to NNT, the others belong to FNT. The PIECE UPDATE packets are sent only to neighbors in NNT. Due to the piece selection strategy operates only on the NNTs; peers don’t need to know about all pieces in the network. Indeed, in wireless networks, the copy of pieces is more efficient when it is based on statistics in the nearby neighborhood since this guarantees a faster local replication compared to a large neighborhood. As in BitTorrent, the choking algorithm selects three best uploaders as effective neighbors. These three neighbors are chosen from both nearby and far neighbor tables. The peer then serves these three neighbors during the next choking period. But in addition to these effective neighbors, the fourth random neighbor is selected from one of the two tables (optimistic slot) using a round robin policy that guarantees an optimal balance between the random unchokes locally and the transmission of pieces to remote neighbors in order to improve diversity. In detail, the peer selects a peer one time from FNT, q times from NNT and so on. In this protocol, the ratio of the number of time slots spent on serving nearby neighbors and those for serving far neighbors bases on the quantum q. It is also the number of slots 20 that a peer should wait before unchoking a distant neighbor again. Sbai’s experiments shown that the optimal choice of the quantum q depend on the number of nodes in network, the maximum length of a path between 2 nodes (hm) and the number of pieces that can be sent during a chocking slot to a node: 𝑞 = 𝛼ℎ𝑚 𝛼1 . ℎ𝑚 2 . 𝑁 2 - N: number of nodes in the network - hm: maximum length of a path between 2 nodes - αi: number of pieces that can be sent during a chocking slot to a node located at i hops For example, in our simulation where N = 40, hm = 12, α1 = 100, α1 = 1, the quantum q is 1 (q is a integer) 2.6.4 Selecting a neighbor at random Selecting a far neighbor In a regular BitTorrent client, a random peer is selected by a uniform probability to unchoke optimistically. While in wireless networks however, the gain we get from optimistic unchoking in terms of diversity increases with the number of hops. Therefore, a peer has more interest in unchoking a farther peer than another one closer to it. Thus, in this modification version of BitTorrent, to select a distant peer to unchoke from FNT, the peer starts by selecting the number of hops to that peer with a probability p given by this formula: 𝑝 ℎ = ℎ ℎ𝑚 + (ℎ𝑚 − 1) 𝑖𝑓 ℎ > ℎ𝑚 − 1 0 𝑒𝑙𝑠𝑒 - hm: maximum number of hops seen by the peer - Suppose that FNT contains only peer at hm and hm -1 hops Once the number of hops h is chosen, the peer at h hops, which is chosen randomly, is the optimal node to unchoke. 21 Selecting a nearby neighbor Once the peer needs to select a nearby neighbor, it chooses a node from NNT in a uniform random way. 2.6.5 Piece selection strategy When the offering is far When receiving a PIECE OFFER message from a wireless neighbor, it considers that it is an offer from far neighbor if the number of hops to the offering node is greater than 2. A specific piece selection strategy will be applied, called the absent piece strategy. The peer firstly computes the redundancy of the offered pieces in its NNT and its piece pool. At the opposite of BitTorrent, the candidate pieces will be those with zero redundancy due to the fact that no need to download a piece from a far node if it exists at nearly neighbor table. So, a piece can be accepted only none of its near neighbors has downloaded it before. If there is more than one absent pieces, one is chosen randomly. The absent piece can then be replicated quickly in the near neighborhood. If no absent piece is noticed, the peer sets a REJECT flag in the PIECE OFFER REPLY packet. When the offering is near Once the peer receives a PIECE OFFER from one of its nearby neighbors, local rarest first algorithm will be used. Pieces with the least number of copies in the NNT are selected. Rarest first is supposed to increase the entropy of pieces in the network that enforces collaboration and hence improves global performance. 2.7 Performance metrics Here are the performance metrics of BitTorrent protocol that we use in through our study: – Uij: Total bytes uploaded by peer i to peer j – Dij: Total bytes downloaded by peer i from peer j. (Ui j = Dji) 22 – Rij: Ratio of sharing between peer i and peer j. 𝑅𝑖𝑗 = 𝑀𝑖𝑛(𝑈𝑖𝑗 ,𝐷𝑖𝑗 ) 𝑀𝑎𝑥(𝑈𝑖𝑗 ,𝐷𝑖𝑗 ) – Ni: Number of neighbors j of peer i such that Uij = 0 or Dij = 0 – Ri: Sharing ratio for node i 𝑅𝑖 = 1 𝑁𝑖 . 𝑅𝑖𝑗 𝑗 | 𝑈𝑖𝑗 ≠0 𝑜𝑟 𝐷𝑖𝑗 ≠0 – Fi: The finish time of peer i. It is the time by which i receives all pieces of the file. Following our instruction, there are some additional performance metrics related to topological positions of peers below. The file is supposed to exist at one seed S at the beginning of the session. Our metrics quantify t he quality of service perceived by peers as a function of their relative positions with respect to the seed. – Fh: Average finish time of peers (or nodes) located at h hops from seed S. 𝐹𝑛 = 1 𝑛ℎ . 𝐹𝑖 𝑖 | 𝐻 𝑖 = ℎ Where nh is the number of peers located at h hops from seed S and H(i) is a function that gives the number of hops between any node i and the seed S. – Rh: Average sharing ratio of peers (or nodes) located at h hops from seed S. 23 𝑅𝑛 = 1 𝑛ℎ . 𝑅𝑖 𝑖 | 𝐻(𝑖) = ℎ 24 CHAPTER 3: AN IMPROVEMENT OF BITTORRENT ADAPTATION TO MANETS 3.1 General ideas BitTorrent uses a centralized node (called a tracker) to solve node discovery problems. This means that each node participating in the BitTorrent system must know the address of the tracker and contact the tracker to get the addresses of other nodes in the network. This cannot be done in mobile ad hoc networks because this kind of networks is formed of mobile devices and it may not rely on a tracker as in conventional wired networks. This issue has been mentioned in the article [8], which uses HELLO messages, but it still contains some problems. Recall that to discover new peers, a peer periodically floods the network with a HELLO message and waits for HELLO REPLY messages. HELLO messages are transmitted to mobile neighbors with some initial TTL (Time-To-Live) to control the scope of the flood and hence the visibility of the peer. This process consumes too many resources and increases the network overhead. Besides, one of the most important characteristics of mobile ad hoc networks is the frequent movement of nodes. Therefore, that solution is not optimal for BitTorrent protocol over MANETs. Dr. Tran Thi Minh Chau gives a new mechanism that solve above issues [3]. This method has never ever applied in any P2P systems. It is a motivation for me to do my thesis. To improve original BitTorrent’s performance when it is deployed on MANETs, we replace the old peer discovery technique with the node presence detection mechanism proposed in [3]. To achieve the same stability as the former BitTorrent, we need some modifications, which will be introduced in section 3.3. 3.2 Node presence detection mechanism We assume that each node in the network has a unique ID. This may be a MAC – or statically assigned IP address. In the old node presence detection mechanism, the IDs of the nodes are transmitted via HELLO messages, and these messages will be forwarded to the other nodes. The obvious problem of this approach is that the amount of data distributed to each node would increase linearly with the number of nodes in the network, which increases network load accordingly. 25 In order to avoid this problem, we use another method to discover node presence in the network, which is described in [3]. This method uses a data structure, which contains the node’s presence status: soft state bloom filter. 3.2.1 Soft state bloom filter A soft state bloom filter is a data structure that represents a set S = {s 1, s2 … sn} of n elements to support membership queries. It is an array of m*l bits (l is typically small, e.g. l = 3). Each element of S stores a counter. A node initializes all counters with the maximum value 2 l - 1. This maximum value indicates that the position of the Bloom filter is not set. K independent hash functions h1, h2 … hk are used, each maps every possible item in the set to a uniformly distributed value in the range {1 … m}. Any hash function with good random distribution and outputs long enough for the Bloom filter size can be selected. There are two basic operations in a bloom filter. To add a new element x, which is a node ID in our specific case, the counters at positions h1(x), h2(x)… hk(x) in S are set to 0, as depicted in Figure 5: Figure 5: A soft state Bloom filter In order to determine the presence of node x, the bits at these positions will be checked. If any of these is 2 l – 1, it means x is not in S. Otherwise, it can be assumed that x is in S with some remaining probability of a false positive that occurs when an element is actually not in the set, but all respective bit positions have been set to 0 by adding other elements. 26 Periodically, before sending a beacon message, a node applies the hash functions to its own ID, all counters at h1(id), h2(id)… hk(id) will be set to 0, and the others that are not equal to 2 l - 1 will be incremented by one. The aging of the information means that positions of leaving nodes will be expired. Thus, it can remove nodes, which are no longer present from the Bloom filter. 3.2.2 Bloom filter operations Timeout and refresh Each node performs three following steps during the timeout and refresh operation: (1) Increment each si by one, if it has not reached the limit of 2 l - 1 (2) Refresh the information about the node’s own presence, by setting s hj(ID) = 0 for all j = 1, 2… k where ID is the ID of the local node. (3) Broadcast the updated aggregate to the neighbors. Merge operation When a node receives a beacon message, the Bloom filter information of the sender will be merged into the local array. Each Bloom filter position is set to the minimum of local and received ages. Presence detection To check another node x is present or not, a node u checks its local aggregate at positions h1(x), h2(x)… hk(x). If one of them equal to 2 l - 1, we conclude that x is not present. We can observe the operation of the BF through the following example: For simplicity, we consider 2 node X, Y and 4 events: 27 Figure 6: Update Bloom filter 3.2.3 Decoupling information decay and BEACON Intervals In some situations, the aging of information is slower than the beaconing in a naive way, for example, when the counter values are increased only every b > 1 beaconing intervals. Let A and B be two neighboring nodes. Assume that si is currently at value 5 in both A and B, but no longer refreshed and should be subject to decay. A increases si to 6, but B’s value of si is still 5, and then A will receive another beacon from B with si = 5, thus resetting A’s aggregate. This will happen as same as with B’s value. To solve this problem, we need a small soft state bloom filter implementation: whenever a beacon is sent without previously ageing the counter values in the local aggregate, the sent-out copy of the aggregate must be decayed (and refreshed) prior to sending it to the neighbors. That is, if A’s value of si is currently 5, and it sends a beacon without decaying its local copy of the aggregate, the broadcast value will be si = 6. 28 Figure 7: Problem when updating Bloom filter 3.3 Integration of node presence detection mechanism into BitTorrent The main goal of our variant of BitTorrent is the combination of BitTorrent downloading mechanism with the new peer discovery method described above to achieve better performances. My simulation results described in the next section will prove this. Instead of using HELLO message, a peer floods periodically the network with a BEACON message. This message contains not only its ID but also a Bloom Filter, which maintains the status of peers in the network. Before sending BEACON message, the peer resets the information about its own presence by applying the hash functions, set hi(ID) = 0 to confirm its existence to the other peers. Upon receiving a BEACON message, a peer merges information from this message and its Bloom filter. The other sender’s neighbor situations are also updated by this operation. Each Bloom filter position is set to the minimum of local and received ages. For example, the sender’s positions in Bloom filter are set to 0 - the minimum value. When a peer no longer exists in the network, its positions in Bloom filter will reach the maximum value: 2 l – 1. Therefore, it needs to be removed from the neighbor tables to avoid affecting to the downloading algorithm. 29 The sending and receiving BEACON messages strategies are very important. They not only help to update the routing table, identify peer IDs but also allow peers to detect and add new peers into their neighbor table. When there are enough entries (≥ 4) in the routing table , the BitTorrent neighboring selection and downloading algorithms, which are present in section 3.6, will be deployed. Firstly, four peers in NNT/FNT are chosen as effective neighbors. They have to be guaranteed as regular peers by using Presence detection operation of Bloom filter (see in section 3.2.2). After that, peers start transferring their pieces. This process will be ongoing and new status of peers in the network will be updated again by using BEACON messages. Here are some functions, which are used to implement the new presence detection mechanism: Algorithm 1: update Bloom filter: Algorithm 2: Check presence: Algorithm 3: Update neighbor tables of peer x: merge(BF sbl): for i ← 0 to m x.bloom[i] = Min(x.bloom[i], sbl[i]) checkPresence(Peer p): for i ← 0 to k if (bloom[hi[p.ID]] = 2 l - 1) removeFromNeighbors(p) for i ← 0 to neighbors.size if hopCount(x, neighbors[i]) ≥ 2 FNT.append(neighbors[i]) else NNT.append(neighbors[i]) 30 Figure 8: Flowchart of new implementation 3.4 Conclusion To sum up, in this chapter, we presented an idea to improve the BitTorrent protocol over MANETs using Bloom filters. According to prove our solution, the next chapter will explain our NS-2 simulation and its results. 31 CHAPTER 4: SIMULATION RESULTS 4.1 Network simulator (NS-2) Network Simulator (Version 2), widely known as NS-2 [9], is a discrete event network simulator. NS is popularly used in the simulation of routing and multicast protocols, among others, and is heavily used in networking research. Simulation of wired as well as wireless network functions and protocols (e.g., routing algorithms, TCP, UDP) can be done using NS-2. In general, NS-2 provides users with a way of specifying such network protocols and simulating their corresponding behaviors. NS-2 is popular in academia for its extensibility (because of its open source model) and plentiful online documentation. 4.2 Main scenario To evaluate the performances of our proposition, we conduct simulation experiments using network simulator (NS-2). We develop an NS-2 application implement the one that M. Sbai built based on basic concepts of BitTorrent algorithm presented in section 2.6 and a new peer discovering mechanism using Bloom filters. Base on the simulation results, we will show that new presence detection mechanism can be deployed to replace the old version completely with better performances. The below parameters are the detailed models of the system in which new version simulation is deployed. 32 Table 1: Values of parameters using in the simulation Parameter Value Number of nodes 40 Number of nodes per row 10 Distance 40 m Routing protocol DSDV Starting download time 1500 s Data rate 1 MB/s File size 10 MB Block size 1 KB Piece size 100 blocks Number of seeds 1 Choking period 40s TTL 2 Quantum (q) variable We initialize a network of N nodes (N = 40 in default) distributed in a grid topology (10 nodes per row). The distance between 2 neighbors is set to 40m while the wireless transmission range is 50m. 33 Figure 9: Network topology Every node connects to each other using 802.11 MAC Layer with the RTS/CTS- Data/ACK mechanism enabled. The data rate is set to 1 MB/s. For ad hoc routing, we use the DSDV proactive protocol [4], and the node mobility is not set. At the beginning of simulation, node 0 located at top left is the seed and all other nodes are leechers. To ensure the convergence of the protocol to equilibrium, the file size is set equal to 10 Mbytes. The file is subdivided into 100 pieces, which contains 100 blocks of 1KB. The first 1500s of simulation is the time interval for network stabilizing, the BEACON messages are also sent in this time to calculate routing tables and initialize Bloom filters. After that, all peers start downloading the file using BitTorrent algorithms by first looking for each other then sharing the pieces. BitTorrent chocking algorithm period is taken 40s. To study the performance of our solution, we run both the old simulation with HELLO messages and the new simulation with BEACON messages to compare the results. We change some parameters of the simulation and observe the behavior of the download finish times of peers and their sharing ratios. 34 4.2.1 Estimate the average finish time Figure 10: Average finish time for our enhanced BitTorrent compared to ordinary BitTorrent with limited neighborhood Figure 8 compares the finish time of ordinary BitTorrent with limited neighborhood (TTL = 2) and our version of BitTorrent using Bloom filter. Each curve presents the average finish time Fh as a function of the number of hop to the seed. As expected, the finish time increases as far as we move away from the source. One can notice in the figure that the finish time in almost peers, which use BEACON messages, is better than HELLO version. This is because of the time to discovery new peers using BEACON messages is shorter than using HELLO, beside, in our solution, peers don’t need to send HELLO_REPLY to the HELLO sender, and they only have to process the BEACON messages. Thus, the network loading also is reduced considerably. 35 4.2.2 Estimate the average sharing ratio Figure 11: Average sharing ratio for our enhanced BitTorrent compared to ordinary BitTorrent with limited neighborhood Another important factor in BitTorrent over wireless ad-hoc networks is the sharing ratio of peers. This observation is illustrated in Figure 9 which compares the sharing ratios of the ordinary BitTorrent with limited neighborhood (TTL=2) with our variant of BitTorrent using Bloom filters. We can easily see that the difference between 2 versions is not significant. This is due to the change of using BEACON does not affect much the neighbor tables. Therefore, the neighboring selection mechanism still works almost the same as the ordinary version. That guarantees the completeness of BitTorrent algorithm. 36 4.2.3 Estimate the network traffic Figure 12: Number of control packets sent between 2 versions To continue to evaluate the performance of the solution, we count the control packets exchanged in the network and compare the differences between the two approaches. We can easily see in figure 10 that the number of control packets transmitted when using BEACON method is significantly less than the former method. Especially, in some cases, using BEACON version can reduces the number of packets a half compared with previous one. This is because when using BEACON method, the nodes only send periodically BEACON messages to their neighbors. While using the HELLO message, the nodes must forward HELLO messages to their neighbors based on the TTL parameter. The larger TTL is, the more the number of control packets sent. Besides, when a node receives a HELLO message, it has to send a HELLO REPLY message to the sender; it also increases the network overhead. This result indicates that our method offers better performances. 37 4.2.4 Impact of the number of network nodes Figure 13: Average finish time for N = 30, 40 and 50 When the number of nodes in the network increases, the number of neighbors of a node increases as well, especially in nodes far away from seed. At the same time, the node will be able to exchange more pieces with the others. This reduces the finish time. It is confirmed in figure 11 where the finish time when N = 30 is highest and this number decreases when the number of nodes increases. However, this trend does not affect too much the nearby nodes. That is why we choose a network with 40 nodes as a stable topology. 38 CONCLUSIONS AND PERSPECTIVES The P2P file-sharing applications in wireless ad hoc networks should provide good quality services on time and finished sharing ratio. These applications have great potential, but the nature of MANETs brings many difficulties to deploy these applications. The solution that we proposed in this thesis has partly resolved this problem. The simulation has also shown desirable results on the feasibility of the solution where both finish time as well as sharing ratio are significantly improved. Our future work will be on modifying the mobility of nodes and adapting our solution to mobile applications. High dynamic of such networks will open the way to new interesting problems. 39 REFERENCES [1] A. Nandan, S. Das, G. Pau, M. Gerla, Cooperative downloading in vehicular ad hoc networks, WONS, Washington, USA, 2005. [2] Cohen, Bram. BitTorrent — a new P2P app. Yahoo eGroups. Retrieved 2007-04-15. [3] Tran Thi Minh Chau. Lightweight Detection of Node Presence in MANETs. Elsevier Ad Hoc Networks 7 (7), pp. 1386-1399, September 2009. [4] C.Perkins, P.Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM'93. [5] (Ed) Javed I. Khan and Adam Wierzbicki. Special Issue, Elsevier Journal of Computer Communication, Foundation of Peer-to-Peer Computing. Volume 31, Issue 2, February 2008. [6] LOO Alfred Wai-Sing. Peer-to-Peer Computing: Building Supercomputers with Web Technologies. [7] Michiardi P., Urvoy-Keller G. Performance analysis of cooperative content distribution for wireless ad hoc networks, WONS 2007, Obergurgl. [8] Mohamed Sbai, Chadi Barakat, Jaeyoung Choi, Anwar Al Hamra and Thierry Turletti. Adapting BitTorrent to wireless ad hoc networks. 7th International conference on ad hoc networks and wireless 2008 (AD-HOC NOW), Sophia Antipolis, France, September 2008. [9] NS: The Network Simulator, [10] Peter Antal. An overview of the BitTorrent Protocol. [11] S. Rajagopalan, C-C. Shen, A cross-Layer Decentralized BitTorrent for Mobile Ad hoc Networks, MOBIQUITOUS, San Jose, USA, 2006. [12] Tamilmani, Karthik. Studying and enhancing the Bittorent protocol. Stony Brook University. Retrieved 2006-05-06. [13] Torrentfreak. [14] Urvoy-Keller. Rarest First and Choke Algorithms Are Enough. IMC'2006, 2006, Rio de Janeiro.

Các file đính kèm theo tài liệu này:

  • pdfLUANVANDoKhanhToan.pdf