SciELO - Scientific Electronic Library Online

 
vol.22 issue4Design and Implementation of Intelligent Controllers in Soft Processors for the Walking of a Biped RobotQuantification of Facial Movements of Healthy Individuals Using Viola-Jones and Otsu author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Computación y Sistemas

On-line version ISSN 2007-9737Print version ISSN 1405-5546

Comp. y Sist. vol.22 n.4 Ciudad de México Oct./Dec. 2018  Epub Feb 10, 2021

https://doi.org/10.13053/cys-22-4-2719 

Regular articles

Priority Scheme for Enhancing the Capacity of Peer-to-Peer Networks in Mobile Environments

Edgar E. Báez Esquivel1 

Mario E. Rivero-Angeles2  * 

Alfonso Fernandez-Vazquez1 

1 Instituto Politécnico Nacional, SEPI Escuela Superior de Cómputo, Mexico

2 Instituto Politécnico Nacional, Centro de Investigación en Computación, Communication Networks Laboratory, Mexico


Abstract:

Given the pervasive use of wireless systems, based on the IEEE 802.11 and LTE standards, Peer-to-Peer (P2P) networks take relevance due to their inherent flexibility and scalability. In a mobile environment, users experience different channel conditions. This has a major impact on the system’s performance as it is perceived by users in different coverage zones. Additionally, users have different degrees of mobility which can improve or degrade the quality of the received signal. In this work, a wireless mobile P2P network is studied. Building on this, two different scenarios are considered. Namely, a WLAN environment where nodes usually know the placement of the access point and can move closer to it in order to improve their channel quality and a cellular system where nodes usually do not know where their attending base station is located. Building on this, a priority model to improve the system’s performance is proposed, studied and analyzed. This priority scheme is based on serving first users that experience a better channel condition in order to improve the file downloading process. The aforementioned networks are analyzed using both a fluid model and a Continuous Time Markov Chain.

Keywords: Index terms; peer-to-peer network; BitTorrent; Markov chain; fluid model; cellular networks; WLAN

1 Introduction

In recent years, Peer-to-Peer (P2P) networks have been extensively studied in order to increase the capacity of systems by having the nodes cooperating to alleviate data traffic at the servers. With the increasing use of mobile devices, such as smartphones and tablets, P2P networks could be an alternative to alleviate the traffic by accessing a wireless network as noted in [1].

Additionally, vehicular networks can also benefit from a P2P architecture for information dissemination of safety and comfort services [2] - [5]. Indeed, modern day vehicles are packet with nodes that recollect information about both the status of the car and the road conditions. This information can be shared among drivers and authorities in order to prevent or detect road accidents. Also, users can share files (music, video, social network data, etc.) among themselves in both pedestrian or vehicular environments either by the sensors inside the vehicles or the mobile devices of drivers, passengers, and pedestrians.

In this work, we are interested on analyzing the effect of different channel quality zones on the system’s performance and the impact of the inherent mobility of nodes in urban vehicular and pedestrian applications.

The issues of a wireless P2P network, as well as the impact of mobility of the nodes has been investigated before in [6] - [8]. In [6] - [8], different challenges on the implementation of a wireless P2P network are identified and discussed.

However, these issues are manly focused on the TCP inherent problems arising from an unreliable and shared channel as well as the impact on the different BitTorrent mechanisms. In [8], the problem from nodes leaving and entering the system, as well as their movement are presented.

In contrast, the case where nodes experience different channel conditions, typical in wireless networks, that are reflected on the data rate are not specifically considered. Nor is considered the effect of mobility affecting the overall system’s performance in terms of the available resources in the network. Specifically, the impact of having some peers that experience a bad channel condition and other peers experiencing better channel conditions have not been studied before. Moreover, we propose to take advantage of the nodes closer to the access point. Indeed, these peers experience a higher data rate. Hence, they provide more bandwidth to the network than peers farther apart from the access point which can only provide a marginal amount of resources to the rest of the peers.

Note that a user with high data rate, can provide a much faster download rate to other peers connected to it while a node with low data rate that serves other peers provides a much higher download time. Building on this, a priority scheme is proposed that first allocates the available resources to users with better channel conditions. Meanwhile, the remaining bandwidth is distributed to the rest of the peers. By doing so, leeches with higher data rates become seeds much faster than leeches with low data rates. This in turns improve the overall bandwidth in the system.

It is important to notice that the impact of the priority scheme is much higher when there are scarce resources in the system. This is because when the system has enough bandwidth (typically when there is a high number of peers connected in the network) all the peers can download at the maximum rate. Hence, there is no visible impact of assigning bandwidth first to leeches closest to the AP or the BS.

The system is studied using a Continuous Time Markov Chain that describes the evolution of the system in terms of the number of leeches and seeds in the different coverage zones.

As for the specific P2P protocol, we focus our attention to Bit Torrent. BitTorrent is a P2P application used to facilitate the download of popular files. The main idea is to divide the files into many pieces called chunks which peers exchange among each other. The BitTorrent protocol differentiates two types of peers: leeches, which are peers that have a part of the file or not data at all, and seeds, which are those peers that have downloaded the complete file and remain in the system for some time to share their resources.

In [9] and [12], the general P2P network is studied by means of analytical tools at the peer level. By this, we refer to a model where only arrivals, departures and file transfers (that correspond to the conversion of peers from leeches to seeds) are considered. These models are very accurate in representing the general behavior of a P2P network in terms of the number of leeches and seeds in the system, which in turns allow to calculate the average capacity of the network and the average download time. Unlike these models we consider the effect of mobility of nodes in wireless P2P networks.

In [1] the authors analyzed P2P models to Internet access in Cellular data networks. By simulations, they assure that the advantages offered by typical P2P networks (wired networks), such as less power transmission and better spacial reuse, does not mean a better performance in Cellular wireless networks. They conclude that this is due to the fact that the main protocols used in the wired networks are not designed to work in wireless environments.

Other works like [15] are focused on the issue of selecting the appropriate peers to download the file from. However, in this work, we focus on the effect of nodes’ mobility in terms of the available resources in the system.

Unlike previous works, we consider a priority-based scheme which is different from the general idea of incentives such as [13, 14]. While the incentives are used as means of influencing a certain behavior in the peers any time the peers are connected to the network, our proposal is used only when the resources in the system are scarce. Meanwhile, when resources are sufficient in the network, there is no need to apply the priority scheme.

In [11] a priority model for a general P2P networks was proposed considering both cooperative and non-cooperative leeches as an incentive. However, this is done in the context of a typical P2P network. In this work, we propose a priority scheme based on the channel condition experienced by a particular peer. Specifically, peers that are closer to the access point are benefited from this scheme in order to have more bandwidth in case of penury. Hence, peers with higher data rates can download the file faster than nodes experiencing bad channel conditions. As such, peers with higher data rates can share the complete file to the rest of the nodes.

The rest of the paper is organized as follows: The main assumptions, variables used in this work are described in detail in Section II Also, the analytical model is developed. Section II presents the main numerical results. The paper finishes with relevant conclusions.

2 Experiments

In this section the basic assumptions and system’s variables of a wireless BitTottent-like P2P network are described. The dissemination of a non-real time data file in a P2Pnetwork is considered. To capture wireless channel impairments, differentiated zones of coverage are considered through the use of adaptive modulation and coding (AMC). That is, the coverage area in the WLAN or a cell in the cellular system is divided into z coverage zones. A node located in the i th coverage zone uses the i th data rate, denoted by µ i . Indeed, it is considered that inner zones have higher bit data rates than outer zones due to the better channel conditions.

In other words, it is considered that µ z < µ (z−1) < ... < µ (1). The total number of leeches in zone i is denoted by x i (for i = 1, 2, , z) while the total number of seeds in zone i is denoted by y i . The number of leeches downloading in zone i at time t is denoted by x i , assumed to be real in this fluid modeling approach.

The total number of leeches and seeds in the system is denoted respectively by x=i=1zxi and y=i=1zyi. New peers arrive to the system to coverage zone i according to a Poisson process having rate λ i and are labeled as leeches. All peers have the same maximum downloading rate c, c > µ 1, µ 2, ..., µ z . Indeed, it is assumed that the maximum download rate is highly dependent on the hardware and the specific standard used rather than the channel conditions. As such, a given peer has to be connected to a number of peers in order to achieve this maximum download rate. A single file download is considered with normalized size of 1.

At any given time there is at least one seed in the system. All peers have complete knowledge of the system, i.e., all peers know which chunks have any other peer and peers always cooperate to upload data if they have available bandwidth. As such, if the number of leeches and seeds is sufficiently high, all leeches download the file at the maximum download rate c. This system condition is referred as abundance.

However, when there are not enough peers in the system, the leeches download at rate i=1zμi(xi+yi) which is considered as a penury environment. Without loss of generality, and for reasons of simplicity, three different coverage zones are considered: good, medium and bad as shown in Fig. 1. As such, the following assumptions are made: z = 3,µ 2 = µ 1/2, and µ 3 = µ 2/2.

Fig. 1. Division of a base station in three zones 

A leech in the system aborts the file download in an exponentially distributed random time with mean 1/θ. Conversely, seeds remain in the system, after the file download an exponentially distributed random time with mean 1/γ.

2.1 Mobility Model

User mobility is considered by assuming that a node in zone i moves to zone i + 1 with rate m + and it moves to zone i − 1 with rate m . In the former case, the user moves to a better coverage zone while in the latter, the user moves to a worst coverage zone. In order to study the effect of user mobility in different environments, two different cases are considered: a) WLAN, where users are typically aware of the location of the access point (AP). As such, a user that finds itself in a bad coverage area can move closer to the AP in order to improve its condition. Therefore, in this scenario, it is considered that m + > m .

This is typical in pedestrian environments, both in indoor (commercial/business buildings, etc.) and outdoor (public plazas, concert and sportive arenas, etc.) scenarios. b) Cellular System, where users usually are not aware of the location of the Base Station (BS). Hence, in case that a user is in a bad coverage zone, it is not able to change to a better coverage zone in an explicit manner. As such, it is considered that m + = m . These are typical vehicular and outdoor pedestrian scenarios where WiFi coverage is not available and nodes must transmit via an ad-hoc or cellular networks.

Finally, it is considered that a leech in zone i becomes a seed in the same zone i after it completes the download of the file with rate τ i . This is because the probability that a user finishes the complete download of the file in the same instant that it changes its coverage zone is considered to be a very low probability event.

2.2 Mathematical Model

The P2P network is modeled using a Continuous Time Markov Chain (CTMC), as shown in Fig. 2, that captures all the previously mentioned events in the network: node’s arrivals, node’s departures, change of coverage zone from nodes due to their mobility and complete file download (a node that finishes the download of the file and goes from leach to seed). The CTMC proposed for this analysis is as follows:

From the previous description, it can be seen that the transfer rate at which leeches become seeds, i.e., leeches download the complete file, τ i , can be expressed as:

τi=min{cxi,j=13μj(xj+yj)xix}. (1)

Fig. 2. CTMC used to model the vehicular and pedestrian network 

From (1), it can be seen that when the system is in abundance conditions, peers download the file at the maximum download rate c. However, in penury conditions, the available resources (given by the number of peers, x + y, uploading the file) are uniformly distributed among the leeches in the different coverage zones as described by: xi/x.

The evolution in time of the previously described system in terms of the number of leeches and seeds in the different coverage zones satisfy:

x1(t)=λ1+x2(t)m+x1(t)mx1(t)θτ1,x2(t)=λ2+x1(t)m+x3(t)m+x2(t)(m++m+θ)τ2,x3(t)=λ3+x2(t)mx3(t)m+x3(t)θτ3,y1(t)=τ1+y2(t)m+y1(t)my1(t)γ,y2(t)=τ2+y1(t)m+y3(t)m+y2(t)(m++m)y2(t)γ,y3(t)=τ3+y2(t)my3(t)m+y3(t)γ.

Let us compute the equilibrium point of this dynamical system, denoted by (x¯1,x¯2,x¯3,y¯1,y¯2,y¯3). The equilibrium is obtained by solving the following system {x1(t)=0,x2(t)=0,x3(t)=0;y1(t)=0,y2(t)=0,y3(t)=0} and by replacing xi(t) by x¯i and yi(t) by y¯i. Assuming thus abundance conditions, that is, assuming that τ i = cx i , we obtain, after some algebra,

x¯1=λ1β+m+(λ1αm+λ2αβ+λ3βm+)β2[α2+m(θ+c)]αβm+m,x¯2=λ1αm+λ2αβ+λ3βm+β[α2+m(θ+c)]αm+m,x¯3=λ3α+m(λ1αm+λ2αβ+λ3βm+)αβ[α2+m(θ+c)]α2m+m,y¯1=c(λ1+x¯2m++y¯2βm+)β(γ+m),y¯2=A+B+x¯2Cαβγ((γ+m++m)2m+m),y¯3=c(λ3+x¯2m+y¯2αm)α(γ+m+), (2)

where:

A = αλ 1 cm (γ + m +),

B = βλ 3 cm +(γ + m ),

C = c(αm + m (γ + m +) + βm + m (γ + m ) + (γ + m +)(γ + m )),

α = c + θ + m + β = c + θ + m . (3)

It is important to mention that this fluid model is developed considering a high amount of nodes in the system as described in [9]. The case of penury, where cxi>j=13μj(xj+yj)xix, is much more complex. As such, we build now a discrete model of the same system, that can be used to study the system in both penury or abundance conditions with no added complexity. Consider vector W(t) = (L 1(t), L 2(t), L 3(t), S 1(t), S 2(t), S 3(t)) ≥ (0, 0, 0, 1, 0, 0), where L i (t) and S i (t) are respecti-vely the number of leeches and seeds in the i th coverage zone i = 1, 2, 3 at time t. With all the previous “exponential assumptions”, W(t) is a continuous time homogeneous Markov chain, with initial state W(0) = (0, 0, 0, 1, 0, 0). Starting from state (l 1, l 2, l 3, n 1, n 2, n 3), for any i ∈ {1, 2, 3}, l i ≥ 0 and n i ≥ 0. Let us represent by e i a unit vector of size 6 whose all entries are zero except the entry at the i th position which is 1 (i = 1, ..., 6). Hence, the transition rates are described as follows:

λ i , to state W(t) + e i , for i = 1, 2, 3.

l i θ, to state W(t) − e i , for i = 1, 2, 3.

τ i , to state W(t) − e i + e j , for i = 1, 2, 3, j = i + 3.

— (n i − 1)γ, to state W(t) − e i , for i = 4, 5, 6.

l i m +, to state W(t) − e i + e j , for i = 2, 3, j = i − 1.

l i m , to state W(t) − e i + e j , for i, j = 1, 2, j = i + 1.

n i m +, to state W(t) − e i + e j , for i = 5, 6, j = i − 1.

n i m , to state W(t)−e i +e j , for i, j = 4, 5, j = i + 1.

This Markov chain is solved numerically.

Finally, the number of peers in each zone is investigated for each environment. In Fig. 5, it can be seen that for the cellular system, the amount of users in each zone is very similar, as users are typically uniformly distributed in the service area. On the other hand, nodes in a WLAN can improve their channel quality by approaching the AP, as noted by the greater number of nodes in zone 1 compared to zone 3.

Fig. 3. Average number of peers (a) seeds, b) leeches) in zone 1 for different values of θ and γ in the cellular environment 

Fig. 4. Average number of peers for different directed mobility ratios, r = m +/m  

Fig. 5. Average number of seeds for WLAN and cellular cases in different coverage zones (a) good, b) medium and c) bad 

2.3 Priority Model

As previously described, we propose a priority scheme that favors the leeches closer to the AP or the BS in order to be served before the leeches in the outer zones whenever the resources in the system are scarce. Thus, we can distinguish three cases:

  • — Abundance: In this case, there are enough resources. Hence, all peers download at the maximum rate, c;

  • — Semi-Penury: Now, the available bandwidth is high enough to serve all leeches in the inner zone at the maximum download rate, c, but not enough to serve the rest of the peers at this maximum rate. As such, leeches in zone 1 download at the maximum rate and the leeches in zone 2 and 3 share the remaining bandwidth.

  • — Penury: In this case, there is not enough bandwidth for any leech in the system. Hence, only the leeches in zone 1 are served with a bandwidth lower than c while the rest of the peers are not served at all.

Following this, the transfer rate τ i can be expressed as follows:

In Abundance conditions, i.e., cx<i=13μi(xi+yi):

τi=cxi, (4)

for i = 1, 2, 3. In Semi-penury conditions, i.e., cx1<i=13μi(xi+yi)<cx:

τ1=cx1,τ1=(j=13μj(xj+yj)cx1)xix2+x3. (5)

for i = 2, 3. Finally, in Penury conditions, i,e., i=13μi(xi+yi)<cx1:

τ1=i=13μi(xi+yi),τ2=τ3=0. (6)

3 Results and Discussion

We now discuss some of the relevant results of this study. Recall that two different scenarios are considered in this work: A pedestrian (for ind-oor/outdoor emplacements) with WLAN coverage and a vehicular (for outdoor emplacement) with cellular coverage.

In Fig. 3, the case for the cellular system is presented, i.e., m + = m for both the Markov and Fluid models developed in the previous section. As expected, the system has the best performance when peers remain longer in the system, increasing the available bandwidth. This occurs when θ and γ are low. As γ increases, the number of seeds decreases and this in turn causes a rapid decrease on the system’s resources which is reflected by a higher number of leeches. Indeed, as resources are scarce, it takes much longer for peers to become seeds. As θ increases, the number of leeches decreases since peers leave the system much faster, even before downloading the file, which in turn causes a decrease on the number of seeds. However the impact of θ is lower that the impact of γ in the network’s performance.

Additionally, it is clear from these results that the number of seeds is more important that the number of leeches in the system.

Observe, for instance, that a high number of leeches does not imply a good system’s performance. It can also be seen that, in general, there is a good correspondence between both models, except for the case where there are a few seeds in the system. Recall that the fluid model is appropriate for a high number of peers. As such, in these conditions, the Markov model is more accurate. The main disadvantage of the Markov model is that it presents a numerical solution rather than a closed expression. Hence, the use of both models presents a more complete view of the system’s performance. In the following, for reasons of space, we present only results from the Markov model, and for the number of peers.

In summary, the equations obtained by the fluid model are well suited in abundance conditions, which usually entails a high number of peers. The great advantage of this mathematical tool is that it renders close expressions for the number of seeds and leeches in the system. On the other hand, with the Markov Model we can analyze any system in any condition. However, the system is solved numerically.

We now compare the cellular (m + = m ) and WLAN (m + = 2m ) environments for different values of the seed’s departure rate, γ, leech’s departure rate, θ, and peers arrival rate, λ, as shown respectively in Fig. 13. For these results, the following parameters were used: c = 0.002, µ 1 = 0.00125, λ = 0.04, m + = 0.002. For the Cellular scenario m = 0.002 and for WLAN m = 0.001. Also the case where nodes are fixed is considered, i.e., m + = m = 0.

Fig. 6. Number of seeds with the priority scheme enabled for the Cellular and WLAN environments for different values of γ and θ 

Fig. 7. Average number of seeds and leeches in zone 1 for WLAN environment for different values of γ and θ 

Fig. 8. Average number of seeds and leeches in zone 2 for WLAN environment for different values of γ and θ 

Fig. 9. Average number of seeds and leeches in zone 3 for WLAN environment for different values of γ and θ 

Fig. 10. Average number of seeds and leeches in zone 1 for Cellular environment for different values of γ and θ 

Fig. 11. Average number of seeds and leeches in zone 2 for Cellular environment for different values of γ and θ 

Fig. 12. Average number of seeds and leeches in zone 3 for Cellular environment for different values of γ and θ 

Fig. 13. Comparison of Cellular, Fixed and WLAN environments for different values of a) γ b) θ and c) λ 

Note that the fixed and cellular environment have a very similar behavior for any conditions of the system, i.e., nodes do not benefit from the existence of better coverage zones. On the other hand, in the WLAN environment, nodes can improve their channel quality, which in turns improves the overall system performance, as seen by the higher number of seeds in the network. This is not as clear when γ is increased, since the number of seeds drastically decreases when γ is high. This result shows the importance of node’s cooperation in P2P networks.

Now, we investigate the impact of the node’s mobility on the system’s performance. Since in a cellular system, users are typically unaware of the placement of the BS, nodes in a bad coverage zone cannot move to a better zone explicitly. As such, we focus our attention on the WLAN environment. In this case, we consider different ratios for users moving closer to the AP compared to users moving away from the AP. As such, we define this ratio as r = m +/m . From these results, it is clear the big impact of a directional mobility of nodes (towards better coverage zones) has on the system’s performance. As r increases, the number of seeds in the good coverage zone also increases rapidly (around 42% from r = 2 to r = 5).

However, after r = 5 there is no longer such a high increase. The reason for this is that for high values of r (r > 5) almost all the nodes are already in zones 1 and 2 and there are almost no peers in zone 3. This implies that r does not have to be too high in order to obtain a good system performance. In Fig. 4, the number of seeds in the three coverage zones are presented for different values of r.

Then, the effect of the priority scheme is analyzed. From Figs. 7 to 9 the average number of seeds and leeches respectively are shown for WLAN environment. In zone 1, it can be seen that when the system is in penury (when the resources are scarce), i.e., high values of θ and/or γ, there are more cooperative seeds and less cooperative leeches with the priority scheme enabled. Note that more seeds means more resources. In zones 2 and 3, there are more cooperative leeches and almost the same amount of seeds. The fact that there are more seeds means that more users complete their downloads successfully, and fewer leeches means that the users complete their downloads in less time.

From Fig. 10 to 12 the average number of seeds and leeches respectively are shown for the Cellular environment. As in the WLAN scenario, It can be seen that when the system is in penury (when the resources are scarce), i.e., high values of θ and/or γ, there are less leeches with the priority scheme enabled in zone 1. Hence, the system has a better performance with the priority scheme than without it. Also, it can be seen that in abundance condition, i.e., low values of θ and/or γ, the effect of the priority scheme is almost null. This is an important result, since it is desirable that the priority scheme has the higher impact when the resources are scarce.

3.1 Priority Scheme

In this section, some relevant results are presented for the priority scheme for mobile nodes in both scenarios: Cellular and WLAN. For these results, the following parameters are used: c = 0.002, µ 1 = 0.00125, λ = 0.04, m + = 0.002. For Cellular scenario m = 0.002 and for WLAN m = 0.001.

First, we compare both scenarios, WLAN and Cellular. From Fig. 14, we can see that in the WLAN scenario there are more leeches than in the Cellular scenarios, this is because in WLAN networks there are more peers in zone 1 than in Cellular networks because in WLAN the users try to get close to the AP to get a better connection.

Fig. 14. Number of leeches with the priority scheme enabled for the Cellular and WLAN environments for different values of γ and θ 

From Fig. 6, we can see that in the WLAN scenario there are more seeds than in the Cellular scenario, this is because in WLAN networks the users tend and are able to move to better zones of coverage much more easier than in Cellular networks. Therefore, in WLAN networks there are more users in the best zone which in turn diminish the download time since in this scenario, there are more resources. For space reasons we only present the peers in zone 1.

4 Conclusions

In this paper, the effect of the quality of the wireless channel and node’s mobility in pedestrian and vehicular networks are studied and analyzed. We analyzed the node’s mobility through different scenarios and using two different mathematical analyses: First, we obtained a set of closed equation that can describe the system in abundance conditions. Additionally, we developed a Markovian model that is able to describe the system in any condition, but this model can only be solved numerically. We compared these two models and we found that in fact, the best match occurs when the system is in abundance, thus validating our assumptions.

Also, it is shown that the priority scheme proposed can improve the performance of the system when the resources are scarce and it has a minor effect when there are enough resources. As such, the use of these types of priority schemes can indeed improve the performance of the system.

As future work, different performance para-meters like delay, and percentage of successful downloads can be considered, as well as different probability distributions can be used to model these kind of systems.

References

1.  Hung-Yun, H., & Raghupathy, S. (2004). On Using Peer-to-Peer Communication in Cellular Wireless Data Networks. IEEE Transactions on Mobile Computing, Vol. 3, No. 1, pp. 57-72. [ Links ]

2.  Babar, S., & Ki-Il, T. (2013). Towards enhanced searching architecture for unstructured peer-to-peer over mobile ad hoc networks. Wireless Personal Communications, pp. 1-23. [ Links ]

3.  Jun-Li, K. et al (2014). A cross-layer middleware for context-aware cooperative application on mobile ad hoc peer-to-peer network. Journal of Systems and Software, Vol. 92, pp. 95-106. [ Links ]

4.  Wichtlhuber, M., & Hausheer, D. (2013). Towards a mobility-supporting incentive scheme for peer-to-peer content distribution. Emerging Management Mechanisms for the Future Internet, Springer Berlin Heidelberg, pp. 88-91. [ Links ]

5.  Jun-Li, K. et al (2013). A cross-layer approach for real-time multimedia streaming on wireless peer-to-peer ad hoc network. Ad Hoc Networks, Vol. 11, No. 1, pp. 339-354. [ Links ]

6.  Zhenyun, Z. et al (2008). On the Impact of Mobile Hosts in Peer-to-Peer Data Networks. IEEE 28th International Conference on Distributed Computing Systems, ICDCS’08. [ Links ]

7.  Yao-Nan, L (2005). Performance issues of P2P file sharing over asymmetric and wireless networks. 25th IEEE International Conference on Distributed Computing Systems Workshops. [ Links ]

8.  Chung-Ming, H., Tz-Heng, H., & Ming-Fa, H. (2007). Network-aware P2P file sharing over the wireless mobile networks. IEEE Journal on Selected Areas in Communications, pp. 204-210. [ Links ]

9.  Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of BitTorrent-Like Peer-to-Peer networks. Proc. ACM SIGCOMM. [ Links ]

10.  Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., & Towsley, D. (2003). Modeling Peer-Peer file sharing systems. Proc. IEEE INFOCOM, Vol. 3, pp. 2188-2198. [ Links ]

11.  Rivero-Angeles, M. E., & Rubino, G. (2010). Priority-Based Scheme for File Distribution in Peer-to-Peer Networks. Proc. International Communications Conference ICC. [ Links ]

12.  de Veciana, G., & Yang, X. (2003). Fairness, incentives and performance in peer-to-peer networks. Proc. Forty-First Annual Allerton Conference on Communication, Control and Computing, Monticello, IL., pp. 749-758. [ Links ]

13.  Bocek, T., Shann, M., Hausheer, D., & Stiller, B. (2008). Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks. IEEE International Symposium on Parallel and Distributed Processing, pp. 1-8. [ Links ]

14.  Jing-Cheng, O., Yue-Bin, W., & Xu-Huai, H. (2009). An incentive mechanism using game theory for P2P networks. Proc. IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, Vol. 2, pp. 715-718. [ Links ]

15.  You-Huan, X., Yun Chun, J., & Ping, Z. (2013). The resource search algorithm based on peer’s dynamic performance in mobile peer-to-peer network. IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), pp.1-5. [ Links ]

Received: May 26, 2017; Accepted: May 09, 2018

* Corresponding author: Mario E. Rivero-Angeles, e-mail: ebaeze0700@alumno.ipn.mx, mriveroa@ipn.mx, afernan@ieee.org

Creative Commons License This is an open-access article distributed under the terms of the Creative Commons Attribution License