<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000401443</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-4-2719</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Priority Scheme for Enhancing the Capacity of Peer-to-Peer Networks in Mobile Environments]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Báez Esquivel]]></surname>
<given-names><![CDATA[Edgar E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rivero-Angeles]]></surname>
<given-names><![CDATA[Mario E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Fernandez-Vazquez]]></surname>
<given-names><![CDATA[Alfonso]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Cómputo ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Computación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>4</numero>
<fpage>1443</fpage>
<lpage>1454</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000401443&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000401443&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000401443&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Given the pervasive use of wireless systems, based on the IEEE 802.11 and LTE standards, Peer-to-Peer (P2P) networks take relevance due to their inherent flexibility and scalability. In a mobile environment, users experience different channel conditions. This has a major impact on the system&#8217;s performance as it is perceived by users in different coverage zones. Additionally, users have different degrees of mobility which can improve or degrade the quality of the received signal. In this work, a wireless mobile P2P network is studied. Building on this, two different scenarios are considered. Namely, a WLAN environment where nodes usually know the placement of the access point and can move closer to it in order to improve their channel quality and a cellular system where nodes usually do not know where their attending base station is located. Building on this, a priority model to improve the system&#8217;s performance is proposed, studied and analyzed. This priority scheme is based on serving first users that experience a better channel condition in order to improve the file downloading process. The aforementioned networks are analyzed using both a fluid model and a Continuous Time Markov Chain.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Index terms]]></kwd>
<kwd lng="en"><![CDATA[peer-to-peer network]]></kwd>
<kwd lng="en"><![CDATA[BitTorrent]]></kwd>
<kwd lng="en"><![CDATA[Markov chain]]></kwd>
<kwd lng="en"><![CDATA[fluid model]]></kwd>
<kwd lng="en"><![CDATA[cellular networks]]></kwd>
<kwd lng="en"><![CDATA[WLAN]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hung-Yun]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Raghupathy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On Using Peer-to-Peer Communication in Cellular Wireless Data Networks]]></article-title>
<source><![CDATA[IEEE Transactions on Mobile Computing]]></source>
<year>2004</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>57-72</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Babar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ki-Il]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards enhanced searching architecture for unstructured peer-to-peer over mobile ad hoc networks]]></article-title>
<source><![CDATA[Wireless Personal Communications]]></source>
<year>2013</year>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jun-Li]]></surname>
<given-names><![CDATA[K. et al]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A cross-layer middleware for context-aware cooperative application on mobile ad hoc peer-to-peer network]]></article-title>
<source><![CDATA[Journal of Systems and Software]]></source>
<year>2014</year>
<volume>92</volume>
<page-range>95-106</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wichtlhuber]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hausheer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a mobility-supporting incentive scheme for peer-to-peer content distribution]]></article-title>
<source><![CDATA[Emerging Management Mechanisms for the Future Internet]]></source>
<year>2013</year>
<page-range>88-91</page-range><publisher-name><![CDATA[Springer Berlin Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jun-Li]]></surname>
<given-names><![CDATA[K. et al]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A cross-layer approach for real-time multimedia streaming on wireless peer-to-peer ad hoc network]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>2013</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>339-54</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhenyun]]></surname>
<given-names><![CDATA[Z. et al]]></given-names>
</name>
</person-group>
<source><![CDATA[On the Impact of Mobile Hosts in Peer-to-Peer Data Networks]]></source>
<year>2008</year>
<conf-name><![CDATA[ IEEE 28th International Conference on Distributed Computing Systems, ICDCS&#8217;08]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yao-Nan]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance issues of P2P file sharing over asymmetric and wireless networks]]></source>
<year>2005</year>
<conf-name><![CDATA[ 25th IEEE International Conference on Distributed Computing Systems Workshops]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chung-Ming]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Tz-Heng]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ming-Fa]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network-aware P2P file sharing over the wireless mobile networks]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>2007</year>
<page-range>204-10</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Srikant]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling and performance analysis of BitTorrent-Like Peer-to-Peer networks]]></source>
<year>2004</year>
<conf-name><![CDATA[ ACM SIGCOMM]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Figueiredo]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaiswal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kurose]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Towsley]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modeling Peer-Peer file sharing systems]]></source>
<year>2003</year>
<volume>3</volume>
<conf-name><![CDATA[ IEEE INFOCOM]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2188-98</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivero-Angeles]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rubino]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Priority-Based Scheme for File Distribution in Peer-to-Peer Networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Communications Conference ICC]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Veciana]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fairness, incentives and performance in peer-to-peer networks]]></source>
<year>2003</year>
<conf-name><![CDATA[ Forty-First Annual Allerton Conference on Communication, Control and Computing]]></conf-name>
<conf-loc>Monticello, IL </conf-loc>
<page-range>749-58</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bocek]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shann]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hausheer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Stiller]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks]]></source>
<year>2008</year>
<conf-name><![CDATA[ IEEE International Symposium on Parallel and Distributed Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jing-Cheng]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Yue-Bin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu-Huai]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[An incentive mechanism using game theory for P2P networks]]></source>
<year>2009</year>
<volume>2</volume>
<conf-name><![CDATA[ IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>715-8</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[You-Huan]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yun Chun]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ping]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[The resource search algorithm based on peer&#8217;s dynamic performance in mobile peer-to-peer network]]></source>
<year>2013</year>
<conf-name><![CDATA[ IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
