SlideShare una empresa de Scribd logo
1 de 35
Design and Analysis of a Mobile
File Sharing
BY:
SADIQUE NAYEEM
(PONDICHERRY UNIVERSITY)
Outline
• Design and analyze a mobile file sharing system
over opportunistic networks using Bluetooth
technology.
• To enable a mobile device to download desired
files from available devices in its neighborhood and
also allow its files to be disseminated to the
network with the facilitation of opportunistic
contacts.
• The key challenges to be address are system
automation and file sharing efficiency.
Opportunistic networks
• Now a days many devices can support spontaneous
interaction among mobile users through wireless
links, such as Bluetooth and Wi-Fi. The resulted
network is often referred as an opportunistic
network(Oppnet). In these networks, contacts
among users are usually opportunistic and
connections among devices are intermittent.
Basic
operational
phases in an
Oppnet.
File Sharing
File sharing scenario of the system can be described as follows:
• Mobile devices search for available devices in their
neighborhoods.
• Request for file sharing services
• Establish the connection
• At the same time, these mobile devices serve as service
providers and respond to requests sent from their neighbors
• The Transaction can be
• File Pulling
• File Pushing
File Pulling & File Pushing
• File pulling is to download files from neighbors.
• File pushing is to distribute files(Ex- Conference)
• There are two different pairs of roles in our file
sharing system:
• (puller, pullee)
• (pusher, pushee)
• Puller is the one who requests for pulling service and
desires to download files from the service provider called
pullee.
• Pusher is the one who requests for pushing services and
wants to distribute its owned files to the service provider
named pushee.
ROLES RELATIONSHIP
File Sharing
Pusher(Responder)
Pullee (Responder)
Pushee (Requester)
Puller (Requester)
Download
Mobile File Sharing
System for Opportunistic Networks
The mobile file sharing system includes three
main components:
• Connectivity mechanism
• Download control and
• Break handling.
System Overview
Connectivity mechanism
The connectivity mechanism is designed to
handle connection for a mobile device for its
diverse roles.
• Device discovery
• Neighbor selection
• Connection establishment.
Connectivity mechanism - Device discovery
• Bluetooth technology for short range communication
which scans for available devices in the neighborhood
periodically.
• Experimentally the device discover neighbors within 17
seconds if there exists at least one in the neighborhood.
Connectivity mechanism -Neighbor selection
• Once available neighbors are discovered
• The neighbor selection strategy is applied for file puller and
pusher to choose a neighbor.
• The file puller maintains a list locally which traces all the
mobile devices that have unfinished file transferring in
their last connections with the puller.
• If such neighbor is found then file transferring completes
successfully .
• Else the file puller chooses the connection candidate from
all available neighbors randomly.
Connectivity mechanism - Neighbor selection
• A file pusher also maintains a list locally which
records all the mobile devices which it has pushed
its files.
• If discovered neighbors exist in the list, the file
pusher will avoid selecting them as connection
candidate, since pusher does not want to push files
to the same device repeatedly.
• Then the file pusher chooses the connection
candidate randomly from all the other available
ones.
Connectivity mechanism - Connection Establishment 1
The system involves two pairs of roles i.e (puller, pullee) and
(pusher, pushee) and connection only occurs between
puller and pullee or pusher and pushee respectively.
• For the pair of file puller and pullee, search criterion is
used to announce its file requirement including file types it
requests. ie. jpeg, .mp3 etc.
• search criterion is send to file pullee
• file pullee accepts the service request if at least one file in
its possession meets the criterion and sends back
acceptance notice with its provided files information.
• After receiving the acceptance notice from file pullee,the
connection b/w puller and pullee is established
successfully.
Connectivity mechanism - Connection Establishment - 2
• For file pusher and pushee, the pushed file information is
used by the pusher to announce files that it desires to
distribute to the network.
• The file pusher sends out pushing request along with the
pushed file information.
• A selected neighbor acting as file pushee accepts the
service request and sends back an acceptance notice.
• The connection is announced to be established
successfully.
ROLES AND FILE INFORMATION LISTS
Each mobile device is capable of serving up to 4 types of
roles whose connection processes for file puller, pullee,
pusher and pushee can be described by the following four
Algorithm.
Download Control
After the connection established, download control
handles file transferring process. The challenge of
download control is
• To reduce file transferring duration
• Improve file sharing efficiency
As puller and pushee are the ones that download files
from pullee and pusher, they can customize their
download sequences with the help of prioritizing
sequence of these files.
PRIORITIZED DOWNLOAD SEQUENCE
Piece Information
• The puller or pushee breaks all the prioritized files that are
about to be downloaded into certain size of pieces.
• Piece information is recorded in a meta file.
• Using file piece has two advantages.
– Firstly, it allows a file to be downloaded from multiple devices as
a device can request different pieces of a file from multiple
devices simultaneously.
– Secondly, it facilitates connection break handling.
• Similar to connectivity mechanism, download control
manages the downloads for the mobile device in different
roles and the download control processes can be described
by the following Algorithm.
Connection Break Handling
• Due to device mobility in opportunistic networks,
opportunistic contacts occur and disappear
frequently. As a result the transfer of data is not
completed successfully. Here the break handler
works which store all existing pieces of unfinished
files temporarily and request for the rest pieces
when the connection is rebuilt.
EVALUATION - I
The file transferring data rate – limiting the peer number to 4
will maximize the data rate
EVALUATION - II
The time taken to merge pieces into a file is minimal when the
file piece size is 100 KB.
EVALUATION - III
File compression is applied on the file provider to reduce file size,
thereby reducing the file transferring duration.
The time taken to download files can be reduced significantly for some
file types, such as .txt and .bmp.
EVALUATION - IV
Finally the whole system efficiency is measured considering
the time taken not only for the file transferring but also the
preparation operations before the transferring and the merging
afterwards.
•Preparation operations includes
•discovering neighbors
•establishing connection with the selected neighbor
•Initiation work in download control.
EVALUATION - V
The time taken to transfer files and merge pieces into files are
directly related to the file size
CONCLUSION
• The mobile file sharing system proposed in this paper provides
an efficient solution for mobile devices in opportunistic
networks to acquire interested files from neighbors and also
distribute files to the network. It is implemented on HP iPAQ
910 smart phones equipped with Bluetooth interfaces. It
allows one mobile device to download or upload files from or
to multiple neighbors and achieves up to 417 KB per second
data rate for file transferring. It is indicated that limiting the
peer number to 4 maximizes the data rate and enhances the
system efficiency. The use of file piece enables connection
break handling. It is clearly shown that file piece with 100 KB
size can minimize the extra time cost according to our
experiment results.
Thank you!

Más contenido relacionado

La actualidad más candente

Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
Srikanth Vanama
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...
makesame
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 

La actualidad más candente (17)

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Communications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologiesCommunications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologies
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
Communications
CommunicationsCommunications
Communications
 
Communications
CommunicationsCommunications
Communications
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Network layer
Network layerNetwork layer
Network layer
 
This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 

Destacado

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
Ritul Sonania
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
webuiltit
 

Destacado (8)

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 
Methods of research
Methods of researchMethods of research
Methods of research
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Crime file
Crime fileCrime file
Crime file
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
 

Similar a Design and analysis of a mobile file sharing system for opportunistic networks

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
eSAT Journals
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
IJCNCJournal
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
Flavio Vit
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
905426
 

Similar a Design and analysis of a mobile file sharing system for opportunistic networks (20)

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
OPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxOPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptx
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Insights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressInsights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming Progress
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area Network
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 

Más de sadique_ghitm

Más de sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Design and analysis of a mobile file sharing system for opportunistic networks

  • 1. Design and Analysis of a Mobile File Sharing BY: SADIQUE NAYEEM (PONDICHERRY UNIVERSITY)
  • 2. Outline • Design and analyze a mobile file sharing system over opportunistic networks using Bluetooth technology. • To enable a mobile device to download desired files from available devices in its neighborhood and also allow its files to be disseminated to the network with the facilitation of opportunistic contacts. • The key challenges to be address are system automation and file sharing efficiency.
  • 3. Opportunistic networks • Now a days many devices can support spontaneous interaction among mobile users through wireless links, such as Bluetooth and Wi-Fi. The resulted network is often referred as an opportunistic network(Oppnet). In these networks, contacts among users are usually opportunistic and connections among devices are intermittent.
  • 5. File Sharing File sharing scenario of the system can be described as follows: • Mobile devices search for available devices in their neighborhoods. • Request for file sharing services • Establish the connection • At the same time, these mobile devices serve as service providers and respond to requests sent from their neighbors • The Transaction can be • File Pulling • File Pushing
  • 6. File Pulling & File Pushing • File pulling is to download files from neighbors. • File pushing is to distribute files(Ex- Conference) • There are two different pairs of roles in our file sharing system: • (puller, pullee) • (pusher, pushee)
  • 7. • Puller is the one who requests for pulling service and desires to download files from the service provider called pullee. • Pusher is the one who requests for pushing services and wants to distribute its owned files to the service provider named pushee. ROLES RELATIONSHIP
  • 8. File Sharing Pusher(Responder) Pullee (Responder) Pushee (Requester) Puller (Requester) Download
  • 9. Mobile File Sharing System for Opportunistic Networks The mobile file sharing system includes three main components: • Connectivity mechanism • Download control and • Break handling.
  • 11. Connectivity mechanism The connectivity mechanism is designed to handle connection for a mobile device for its diverse roles. • Device discovery • Neighbor selection • Connection establishment.
  • 12. Connectivity mechanism - Device discovery • Bluetooth technology for short range communication which scans for available devices in the neighborhood periodically. • Experimentally the device discover neighbors within 17 seconds if there exists at least one in the neighborhood.
  • 13. Connectivity mechanism -Neighbor selection • Once available neighbors are discovered • The neighbor selection strategy is applied for file puller and pusher to choose a neighbor. • The file puller maintains a list locally which traces all the mobile devices that have unfinished file transferring in their last connections with the puller. • If such neighbor is found then file transferring completes successfully . • Else the file puller chooses the connection candidate from all available neighbors randomly.
  • 14. Connectivity mechanism - Neighbor selection • A file pusher also maintains a list locally which records all the mobile devices which it has pushed its files. • If discovered neighbors exist in the list, the file pusher will avoid selecting them as connection candidate, since pusher does not want to push files to the same device repeatedly. • Then the file pusher chooses the connection candidate randomly from all the other available ones.
  • 15. Connectivity mechanism - Connection Establishment 1 The system involves two pairs of roles i.e (puller, pullee) and (pusher, pushee) and connection only occurs between puller and pullee or pusher and pushee respectively. • For the pair of file puller and pullee, search criterion is used to announce its file requirement including file types it requests. ie. jpeg, .mp3 etc. • search criterion is send to file pullee • file pullee accepts the service request if at least one file in its possession meets the criterion and sends back acceptance notice with its provided files information. • After receiving the acceptance notice from file pullee,the connection b/w puller and pullee is established successfully.
  • 16. Connectivity mechanism - Connection Establishment - 2 • For file pusher and pushee, the pushed file information is used by the pusher to announce files that it desires to distribute to the network. • The file pusher sends out pushing request along with the pushed file information. • A selected neighbor acting as file pushee accepts the service request and sends back an acceptance notice. • The connection is announced to be established successfully.
  • 17. ROLES AND FILE INFORMATION LISTS Each mobile device is capable of serving up to 4 types of roles whose connection processes for file puller, pullee, pusher and pushee can be described by the following four Algorithm.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Download Control After the connection established, download control handles file transferring process. The challenge of download control is • To reduce file transferring duration • Improve file sharing efficiency As puller and pushee are the ones that download files from pullee and pusher, they can customize their download sequences with the help of prioritizing sequence of these files.
  • 24. Piece Information • The puller or pushee breaks all the prioritized files that are about to be downloaded into certain size of pieces. • Piece information is recorded in a meta file. • Using file piece has two advantages. – Firstly, it allows a file to be downloaded from multiple devices as a device can request different pieces of a file from multiple devices simultaneously. – Secondly, it facilitates connection break handling. • Similar to connectivity mechanism, download control manages the downloads for the mobile device in different roles and the download control processes can be described by the following Algorithm.
  • 25.
  • 26.
  • 27.
  • 28. Connection Break Handling • Due to device mobility in opportunistic networks, opportunistic contacts occur and disappear frequently. As a result the transfer of data is not completed successfully. Here the break handler works which store all existing pieces of unfinished files temporarily and request for the rest pieces when the connection is rebuilt.
  • 29. EVALUATION - I The file transferring data rate – limiting the peer number to 4 will maximize the data rate
  • 30. EVALUATION - II The time taken to merge pieces into a file is minimal when the file piece size is 100 KB.
  • 31. EVALUATION - III File compression is applied on the file provider to reduce file size, thereby reducing the file transferring duration. The time taken to download files can be reduced significantly for some file types, such as .txt and .bmp.
  • 32. EVALUATION - IV Finally the whole system efficiency is measured considering the time taken not only for the file transferring but also the preparation operations before the transferring and the merging afterwards. •Preparation operations includes •discovering neighbors •establishing connection with the selected neighbor •Initiation work in download control.
  • 33. EVALUATION - V The time taken to transfer files and merge pieces into files are directly related to the file size
  • 34. CONCLUSION • The mobile file sharing system proposed in this paper provides an efficient solution for mobile devices in opportunistic networks to acquire interested files from neighbors and also distribute files to the network. It is implemented on HP iPAQ 910 smart phones equipped with Bluetooth interfaces. It allows one mobile device to download or upload files from or to multiple neighbors and achieves up to 417 KB per second data rate for file transferring. It is indicated that limiting the peer number to 4 maximizes the data rate and enhances the system efficiency. The use of file piece enables connection break handling. It is clearly shown that file piece with 100 KB size can minimize the extra time cost according to our experiment results.