Skip to main content
Log in

Improving robustness of P2P applications in mobile environments

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile P2P networks possess particular characteristics which make accessibility of services deployed on peers a challenge. This has to be taken into account when considering robustness of applications that depend on successfully accessing a set of services. While ensuring robustness is traditionally handled through replication or redundancy, those solutions are not readily applicable to decentralized and dynamic networks. Instead, current solutions are based on efficient P2P structure maintenance or unstructured network search algorithms. A novel and alternative method proposed in this paper is based on the observation that some redundancy may exist between services offered on the network, a fact which could be used to recreate an unavailable service from services accessible to a peer. Instead of adding redundancy to the system, our solution exploits the already existing redundancy to improve robustness of mobile P2P applications. We model the interaction with services as finite-state transducers and propose a heuristic to obtain redundancy between any pair of services. Then, a set of algorithms that uses this inter-service redundancy to recreate the interaction with one service from the other is discussed. The computational cost is polynomial with respect to services’ size, and in practice, the non-redundant functionality and related control need to be implemented locally.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. Different services may be the reflection of different capabilities of various mobile devices.

  2. A relation is regular if it is computed by a finite state transducer.

  3. In the case when C ≡ T, that is, T contains C and C contains T, then the number of states and links is exactly the same.

References

  1. Kellerer W, Schollmeier R, Wehrle K (2005) Peer-to-peer in mobile environments. In: Steinmetz R, Wehrle K (eds) Peer-to-peer systems and applications. Lecture notes in computer science, vol 3485. Springer, Heidelberg, pp 401–417

    Chapter  Google Scholar 

  2. Shneidman J, Parkes DC (2003) Rationality and self-interest in peer to peer networks. In: Kaashoek MF, Ion Stoica (eds) IPTPS. Lecture notes in computer science, vol 2735. Springer, Heidelberg, pp 139–148

    Google Scholar 

  3. Petrie CJ, Bussler C (2003) Service agents and virtual enterprises: a survey. IEEE Internet Computing 7(4):68–78

    Article  Google Scholar 

  4. Kellerer W, Despotovic Z, Michel M, Hofstatter Q, Zöls S (2007) Towards a mobile peer-to-peer service platform. In: SAINT workshops. IEEE Computer Society, Los Alamitos, p 2

    Google Scholar 

  5. Wolfson O, Xu B, Tanner RM (2007) Mobile peer-to-peer data dissemination with resource constraints. In: Becker C, Jensen CS, Su J (eds) MDM. IEEE, Piscataway, pp 16–23

    Google Scholar 

  6. Takeshita K, Sasabe M, Nakano H (2008) Mobile p2p networks for highly dynamic environments. In: PerCom. IEEE Computer Society, Los Alamitos, pp 453–457

    Google Scholar 

  7. Risson J, Moors T (2006) Survey of research towards robust peer-to-peer networks: search methods. Comput Netw 50(17):3485–3521

    Article  MATH  Google Scholar 

  8. Lindemann C, Waldhorst OP (2004) Exploiting epidemic data dissemination for consistent lookup operations in mobile applications. SIGMOBILE Mob Comput Commun Rev 8(3):44–56

    Article  Google Scholar 

  9. Medidi M, Ding J, Medidi S (2005) Data dissemination using limited flooding in wireless sensor networks. In: Yang LT, Arabnia HR, Wang L-C (eds) ICWN. CSREA, Las Vegas, pp 434–440

    Google Scholar 

  10. Landsiedel O, Götz S, Wehrle K (2006) A churn and mobility resistant approach for dhts. In: MobiShare ’06: proceedings of the 1st international workshop on decentralized resource sharing in mobile computing and networking, New York, NY, USA. ACM, New York, pp 42–47

    Chapter  Google Scholar 

  11. Brand D, Zafiropulo P (1983) On communicating finite-state machines. J ACM 30(2):323–342

    Article  MATH  MathSciNet  Google Scholar 

  12. Abiteboul S, Vianu V, Fordham BS, Yesha Y (1998) Relational transducers for electronic commerce. In: Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems, June 1–3, 1998, Seattle, Washington. ACM, New York, pp 179–187

    Chapter  Google Scholar 

  13. Farahbod R, Glässer U, Vajihollahi M (2004) Specification and validation of the business process execution language for web services. In: Abstract state machines. Springer, Heidelberg, pp 78–94

    Google Scholar 

  14. Gurevich Y (2000) Sequential abstract-state machines capture sequential algorithms. ACM Trans Comput Log 1(1):77–111

    Article  MathSciNet  Google Scholar 

  15. Börger E (2007) Modeling workflow patterns from first principles. In: Parent C, Schewe K-D, Storey VC, Thalheim B (eds) ER. Lecture notes in computer science, vol 4801. Springer, Heidelberg, pp 1–20

    Google Scholar 

  16. Grieskamp W, Gurevich Y, Schulte W, Veanes M (2002) Generating finite state machines from abstract state machines. In: Proceedings of the international symposium on software testing and analysis (ISSTA), pp 112–122

  17. Berardi D, Calvanese D, De Giacomo G, Lenzerini M, Mecella M (2003) Automatic composition of e-services that export their behavior. In: Orlowska ME, Weerawarana S, Papazoglou MP, Yang J (eds) ICSOC. Lecture notes in computer science, vol 2910. Springer, Heidelberg, pp 43–58

    Google Scholar 

  18. Bultan T, Fu X, Hull R, Su J (2003) Conversation specification: a new approach to design and analysis of e-service composition. In: WWW, pp 403–410

  19. Dang Z, Ibarra OH, Su J (2004) Composability of infinite-state activity automata. In: Fleischer R, Trippen G, (eds) ISAAC. Lecture notes in computer science, vol 3341. Springer, Heidelberg, pp 377–388

    Google Scholar 

  20. Roche E (1997) Compact factorization of finite-state transducers and finite-state automata. Nord. J. Comput. 4(2):187–216

    MATH  MathSciNet  Google Scholar 

  21. Roczniak A, Melhem J, Levy P, El-Saddik A (2006) Design of distributed collaborative application through service aggregation. In: DS-RT. IEEE Computer Society, Los Alamitos, pp 165–174

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Roczniak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Roczniak, A., El Saddik, A. Improving robustness of P2P applications in mobile environments. Peer-to-Peer Netw. Appl. 2, 217–229 (2009). https://doi.org/10.1007/s12083-009-0032-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-009-0032-z

Keywords

Navigation