SlideShare a Scribd company logo
1 of 5
Download to read offline
A Platform and Applications
                                    for Mobile Peer-to-Peer Communications
                Takeshi Kato                             Norihiro Ishikawa                         Hiromitsu Sumino
                                                          NTT DoCoMo Inc.
                                                     3-5, Hikarino-oka, Yokosuka
                                                          Kanagawa JAPAN
               Johan Hjelm                                      Ye Yu                                Shingo Murakami
             Ericsson Research                                               Ericsson Research Japan
      Torshamnsgatan 23, Kista SE-16480                                    3-4, Hikarino-oka, Yokosuka
            Stockholm Sweden                                                    Kanagawa JAPAN

    Abstract-The peer-to-peer service has entered the public          terminal capabilities. This should be taken into account when
limelight over the last few years. Several research projects are      developing systems which will work in a mobile environment.
underway on peer-to-peer technologies, but no definitive              Additionally, various wireless have been emerging of network
conclusion is currently available. Comparing to traditional server-   environments such as IMT-2000 (International Mobile
client technology on the Internet, the peer-to-peer technology has    Telecommunications-2000, for example FOMA [8]), Wireless
capabilities to realize highly scalable, extensible and efficient     LAN and Bluetooth, and users can select them to satisfy their
distributed applications. At the same time mobile networks such as    network demands. In the near future, an environment where
i-mode, WAP, wireless LAN and Bluetooth have been developing          many sensors, users and different kind of objects exist, move
at breakneck speed. Demand for using peer-to-peer applications        and communicate with one another, called “ubiquitous
over PDAs and cellular phones is increasing. The purpose of this      communication environment”, will appear.
study is to explore a mobile peer-to-peer network architecture           In fact, peer-to-peer technology is one of the most important
where a variety of devices communications each other over a           and suitable networking technologies for ubiquitous
variety of networks. In this paper, we propose the architecture       communications since it supports easily one-to-one
well-adapted to mobile devices and mobile network. The key            communication between devices, free and extensible
features of this architecture are 1) supporting for multicast         distribution of resources and distributed search for enormous
communication; 2) incorporating a mobile devices into a peer-to-      amount of resources.
peer network; 3) XML-based protocol which has readability and
extensibility. In this architecture we have been designing P2P           The principal goal of our work is thus to design a mobile
protocols using XML and algorithms for controlling the mobile         peer-to-peer architecture and a general peer-to-peer platform
peer-to-peer network. We are currently designing Java APIs            that enhances communication capabilities for mobile clients, by
needed for the mobile peer-to-peer applications. We have been         utilizing network resources efficiently and supporting mobility
implementing the mobile peer-to-peer network prototype system         in an integrated and practical way.
and some peer-to-peer applications.
                                                                        The rest of this paper is organized as follows. Section 2 gives
                        I. INTRODUCTION                               an overview of our peer-to-peer architecture, describes each
                                                                      key element of our architecture, i.e., multicast communication
   In the cooperated network, the server-client technology has        and Mobile device adaptation. Section 3 describes the protocol
been used as the traditional way to handle network resources          design. We report the current status of our prototyping
and provide Internet services. It has advantages to regulate          implementation in section 4. Finally, a conclusion is given in
Internet services by only maintain limited number of central          section 5.
servers. However some major concerns have been raised, for
example overload and expensive operation cost of the central                                 II. ARCHITECTURE
servers, needs of mutual and direct communications between
network users. As a result, peer-to-peer technology has become        A.   Architecture overview
popular and has been used in networks which manage vast
amounts of data daily, and balance the load over a large number         The proposed mobile peer-to-peer architecture is shown in
of servers. Peer-to-peer applications such as distributed search      Fig. 1. All of the peer-to-peer communication entities that have
applications [2], file sharing system [3] [4], distributed storage    a common set of interest and obey a common set of policies
system [5] and group ware [6] have been proposed and                  construct one peer-to-peer community. This architecture
developed. Additionally, a generalized platform for peer-to-          consists of the following basic components:
peer applications has been proposed [7] and developed.
                                                                      Peer-to-peer node: The peer-to-peer node is an independent
   At the same time, mobile Internet services have become very        communication entity in the peer-to-peer network. It can be a
popular. In the past four years, the market of mobile Internet        mobile device, a PDA, a personal computer, a server or a
services has considerably grown successful in Japan where i-          workstation, or any of a variety of devices.
mode is the most famous example. The mobile environment is
different from the fixed Internet in that it is an extremely          Mobile proxy: Theoretically, all the mobile devices (e.g. WAP
constrained environment, in terms of both communication and           or i-mode terminals) can be independent nodes in the peer-to-
peer architecture. However some of them are functionally                                               optimization,      node     authentication           and      multicast           group
limited and can not act as autonomous nodes. The mobile proxy                                          management.
is a function in a node, which acts as a proxy for the mobile
                                                                                                       Gateway node: Gateway node is a connection entity linking
devices with constrained capability, so that these mobile
                                                                                                       between a pure peer-to-peer network and a hybrid peer-to-peer
devices can join the peer-to-peer architecture.
                                                                                                       network. It provides for nodes in pure peer-to-peer network
                                        Peer-to-peer community                                         with several proxy functions such as routing information
                                                 Control node
         Peer-to-peer node
                                                                                                       provision, node authentication, and multicast group
                                                                                                       management.

        Pure peer-to-peer                                                      Pure peer-to-peer
                                                                                                          A control node receives a request from a peer-to-peer node
                                           Hybrid peer-to-peer
                                                                                                       and provides it with routing information, topology optimization
                    Gateway node
                                                                                                       function and security function. A gateway node collects
                                                                          Gateway node
                             Peer-to-peer node           Mobile Proxy           Peer-to-peer node      topology information on a pure peer-to-peer network and
                                       Cellular Phone                                                  reports it to the control node. A peer-to-peer node in a hybrid
                                                                                                       peer-to-peer network reports its existence and adjacent nodes to
           Fig. 1. The mobile peer-to-peer architecture                                                the control node and can efficiently communicate with each
                                                                                                       other by using the routing information provided by the control
  Based these basic components, the hybrid peer-to-peer
                                                                                                       node. A gateway node supports the seamless communication
network administrated by a control node (central point) and the
                                                                                                       between a node in a pure peer-to-peer network and a node in a
pure peer-to-peer network without a control node, are defined.
                                                                                                       hybrid peer-to-peer network.
                                                                Control node
              Peer-to-peer node                                                                        B.   Peer-to-peer multicast communication
                                                                                                         In peer-to-peer networks, multicast communication is
                                                                                                       available for a variety of applications, such as communications
                                                       Peer-to-peer node                               among work group members in group ware applications and so
             (a) Pure peer-to-peer architecture                 (b) Hybrid peer-to-peer architecture   on. Peer-to-peer multicast architecture is represented in Fig. 3.
       Fig. 2. Pure peer-to-peer and hybrid peer-to-peer                                               As shown in this figure, a multicast network overlays a peer-to-
                                                                                                       peer network. Multicast forwarding is carried out by multi-hop
Pure peer-to-peer architecture: There are only peer-to-peer                                            or multi-destination unicast in a peer-to-peer network.
nodes in the pure peer-to-peer architecture. The proposed pure                                         Therefore it is not necessarily for all nodes in peer-to-peer
peer-to-peer architecture is shown in Fig. 2 (a). The connection                                       network have to support multicast.
between peer-to-peer nodes is established on their mutual trust.
Each peer-to-peer node is an independent entity and can                                                             Peer-to-peer
                                                                                                                     multicast
participate in and leave the peer-to-peer network at its                                                           network layer

convenience. Messages are sent from a peer-to-peer node to
                                                                                                                   Peer-to-peer
another one directly or by passing them via some intermediary                                                     network layer
peer-to-peer nodes.
Hybrid peer-to-peer architecture: The hybrid peer-to-peer                                                                               Multi-hop unicast    Multi-destination unicast

architecture resolves the disadvantages of the pure peer-to-peer                                                  Fig. 3. Peer-to-peer multicast mechanism
architecture such as inefficient routing, splits of network and
                                                                                                          Fig. 4 shows the peer-to-peer multicast path construction
lack of security, by introducing a control node. The proposed
                                                                                                       procedure. When a peer-to-peer node tries to join a certain
hybrid peer-to-peer architecture is shown Fig. 2 (b). In our
                                                                                                       multicast group, (1) a peer-to-peer node sends a join message to
architecture, the control node provides the functions for
                                                                                                       the nearest member node. (2) The nearest member node sends
providing routing information to a destination node,
                                                                                                       back a join response message to it and (3) the two nodes
discovering the first peer-to-peer node, recovering from the
                                                                                                       establish the relationship regarding the multicast group. (4)
splitting of the peer-to-peer network, improving the network
                                                                                                       After that, a multicast message propagates along the multicast
topology and security such as authentication, in order to
                                                                                                       paths. In the pure peer-to-peer architecture, a node looks for the
improve the inefficiency of the pure peer-to-peer architecture.
                                                                                                       nearest member node using a flooding message when it tries to
  To realize the hybrid peer-to-peer architecture, the control                                         join a multicast group. In the hybrid peer-to-peer architecture, a
node and the gateway node are defined.                                                                 control node informs a node of the nearest member node in
                                                                                                       response to the node’s request.
Control node: Control node is an administrative entity which
manages a peer-to-peer community in the peer-to-peer network.                                            Peer-to-peer multicast is similar to ALM (Application layer
It provides several functions independent of particular                                                multicast) [9] [10] [11]. These forwarding mechanisms might
applications such as name resolution, route information                                                be adopted in peer-to-peer multicast with some modifications.
provision, the first per-to-peer discovery, network topology                                           Additionally, bi-directional shared minimum spanning tree
might be well-suited for peer-to-peer multicast because many                                       into a message of a peer-to-peer protocol. In Fig. 5 (c), a pair of
peer-to-peer nodes tend to be senders. MST (Minimum                                                a mobile device and a proxy function constructs a peer-to-peer
Spanning Tree) has the property that sum total of distances                                        node in the peer-to-peer architecture. In this case, a mobile
among all nodes are minimized. Therefore, each distance                                            device has its own node name, and acts as a separate node
between nodes is well optimized.                                                                   through a mobile proxy. The mobile proxy does not act as an
                                                                 (4) Multicast message
                                                                                                   independent node. It will be decided by requirements of peer-
                           (3) The two nodes make a              propagate along multicast paths   to-peer applications, as to which type of mobile proxy model
                           relationship
             Peer-to-peer                                                                          will be preferable.
              multicast
            network layer                 (2) The nearest member node
                                          sends a join response message

            Peer-to-peer
           network layer                                                                                                       III. PROTOCOL DESIGN

                                     (1) Sending a join message to a
                                                                                                   A.   Protocol overview
                                     nearest member node
                                                                                                      Fig. 6. shows the protocol stack. The proposed protocols
          Fig. 4. Procedure of joining multicast group                                             have been designed over HTTP, TCP and Bluetooth in two
                                                                                                   layers. P2P Core Protocol is defined to process peer-to-peer
C.   Mobile device adaptation                                                                      message based on peer-to-peer communication model, six
   Another distinct characteristic of this architecture is that it                                 protocols realizing peer-to-peer multicast, communication with
allows mobile devices to take part in the peer-to-peer network                                     a control node and control of a peer-to-peer session and so on
via a mobile proxy node. While a mobile device, such as a                                          are defined over the P2P Core Protocol. Based on the layered
cellular phone, may have enough capabilities to act as an                                          approach of the protocol design, it is easy to design a new P2P
independent peer-to-peer node in the future, it still has the                                      application protocol based on the requirements of peer-to-peer
following limitations at this time:                                                                applications. Furthermore, the proposed protocols are defined
•     Limited storage                                                                              using XML. Since XML has a capability to design general tree-
•     Small runtime heap                                                                           structured data, it is possible to design complicated protocol
•     Modest processor performance                                                                 messages required by peer-to-peer applications, and layered
•     Constrained electrical power                                                                 protocols independently using XML Namespace. Therefore
   Thus, a current mobile device can’t fully perform the role of                                   XML is well suitable to design such an application protocol.
a peer-to-peer node that offers services to other peer-to-peer                                                  P2P Basic
                                                                                                              Communication
                                                                                                                              P2P Basic
                                                                                                                               Service
                                                                                                                                            P2P Multicast
                                                                                                                                           Communication
                                                                                                                                                               P2PMulticast
                                                                                                                                                                 Service
                                                                                                                                                                              P2P Control
                                                                                                                                                                               Message
                                                                                                                                                                                                     P2P
                                                                                                                                                                                                  Application

nodes in a peer-to-peer network. In order to incorporate a                                                       Protocol      Protocol       Protocol           Protocol      Protocol            Protocols



mobile device into a peer-to-peer network, some functions must                                                                                  P2P Core Protocol


be done by other nodes on behalf of a mobile device. Through                                                                  HTTP
                                                                                                                                                                                              No-IP
the cooperation of a mobile proxy, a mobile device can                                                                                    TCP
                                                                                                                                                                                            (Bluetooth)
                                                                                                                                          IP
virtually act as a peer-to-peer node and can perform the                                                                                             Network
necessary functions in the peer-to-peer architecture. From the
                                                                                                                                 Fig. 6. Protocol stack
point of view of the peer-to-peer architecture, mobile devices
are modeled in the three ways.
                       Mobile Proxy (Node A)                                Mobile Proxy
                                                                                                   B.   P2P Protocols
                      Mobile A
                                                                        Node A
                                                                       (Mobile A)                     The P2P Core Protocol has been designed to process a peer-
                                     Proxy
                                    Function
                                                                        Node B
                                                                                     Node C        to-peer message according to peer-to-peer communication
                      Mobile B
                                                                       (Mobile B)                  model. We defined three message types to realize peer-to-peer
                             (a) Type 1                                      (b) Type 2            communication. Request and response messages are defined for
                                                  Mobile Proxy
                                                      Node A                                       the reactive communication mode and advertise message is
                                                             Proxy
                                               Mobile A
                                                          Function A                               defined for proactive communication mode. Additionally, we
                                                      Node B
                                                            Proxy
                                                                                                   defined three communication types: unicast, multicast and
                                               Mobile B   Function B
                                                                                                   broadcast. A unicast message is sent to the destination node
                                                    (c) Type 3                                     directly, using multi-hop unicast or multi-destination unicast.
                  Fig. 5. Mobile proxy architecture                                                When a node receives a multicast message from a multicast
                                                                                                   member node, it forwards the received message to remaining
  In Fig. 5 (a), mobile devices share the same proxy node.                                         adjacent member nodes using multi-hop unicast. A node sends
From the point of view of the network, the mobile proxy acts as                                    a broadcast message to all adjacent nodes. The forwarding of a
one peer-to-peer node. In Fig. 5 (b), a mobile device has its                                      broadcast message is controlled by its hop count. Since the
own node name and acts as a separate peer-to-peer node in the                                      naming and the message routing mechanism of the P2P Core
peer-to-peer architecture. For realizing this type of mobile                                       Protocol are defined to be independent of transport protocols,
proxy, some proxy functions should be implemented on Node C                                        the P2P core protocol can be defined over various transport
such as transforming a message received from a mobile device
protocols. Table I shows protocols defined over the P2P Core                                                Node A                                                Node B                                                Node C           ………                        Node X
Protocol.                                                                                    Looking for                               Lookfor                              Connection establishment
                                                                                             peer- node

                                     TABLE I                                                                               LookforResponse
                               METHODS AND MESSAGES                                                                                                                                  LookforResponse
                                                                                                                                                                                                                                     LookforResponse
       Protocol                 Method                   Message                             Connecting                                      Hello
                                                                                              first peer
       P2P Basic                Hello method             Hello                                   node
       Communication                                                                                                     HelloResponse
       Protocol                                          HelloResponse
                                                                                                                     Connection establishment
                                Bye method               Bye
                                                                                                                          ResourceInformation                                       Exchanging
                                Resource Information     ResourceInformationAdvertise                                                                                                Resource
                                Exchange method                                                                                Advertise                                            Information
                                                         ResourceInformationRequest
                                                                                                                          ResourceInformation
                                                         ResourceInformationResponse                                           Advertise
       P2P Basic Service        Service Provide method   ServiceAdvertise
       Protocol                                                                                                           ResourceInformation                                                                                        Searching
                                                         ServiceRequest                                                        Request                                                                                               multicast
                                                                                                                                                                                                                                       group
                                                         ServiceResponse                                                                                                                                                              member
                                                                                                                                                                                ResourceInformation
       P2P Multicast            Join method              Join                                                                                                                        Response
       Communication
       Protocol                                          JoinResponse
                                                                                                                                             Join
                                                                                             Establishing
                                Leave method             Leave                                 adjacent
                                                                                             relationship
       P2P Multicast Service    Multicast Service        MulticastServiceAdvertise                                                                                                       JoinResponse
       Protocol                 Provide method
                                                         MulticastServiceRequest
                                                                                                                                         Multicast Connection establishment
                                                         MulticastServiceResponse
       P2P Control Message
       Protocol
                                Error Report method      ErrorReport                                                                       Fig. 7. Example of sequence
                                Diagnose method          Diagnose
                                                         DiagnoseResponse
                                Lookfor method           Lookfor                                                                IV. PROTOTYPE IMPLEMENTATION
                                                         LookforResponse
                                                                                        A.    Tools and Open APIs
   The P2P Basic Protocol is defined to realize the
                                                                                           We are currently implementing a prototype for the peer-to-
establishment and the release of a peer-to-peer session. The P2P
                                                                                        peer node, the gateway node and the control node. All nodes
Multicast Communication Protocol is defined to construct a
                                                                                        are implemented in Java (J2SE 1.3.1) on Microsoft Windows
multicast distribution tree among multicast member nodes and
                                                                                        2000 and Red hat Linux 7.2. Protocol APIs have been provided
to forward a multicast message over it. In the hybrid peer-to-
                                                                                        for application developers. This prototype provides the basic
peer architecture, the P2P Basic Service Protocol is used
                                                                                        functions of the mobile peer-to-peer protocols and some utility
between a peer-to-peer node and a control node to efficiently
                                                                                        tools. Fig. 8. shows the API design within a peer-to-peer node.
enhance communications between peer-to-peer nodes.
                                                                                        We prepared three levels of API. The application developers
Additionally, the P2P Multicast Communication Protocol is
                                                                                        can easily design a new P2P Application Protocol for a certain
used between a peer-to-peer node and a control node to
                                                                                        application using these APIs.
efficiently enhance multicast communication between peer-to-
                                                                                                                                                                         Application Environment
                                                                                                                                                                         Application Environment
peer nodes. The P2P Control Message Protocol is defined to                                                    Instant Messaging
                                                                                                               Instant Messaging                                    Metadata Search
                                                                                                                                                                    Metadata Search                                                          Other Application
                                                                                                                                                                                                                                             Other Application
                                                                                                                                                                                                                        ……
                                                                                                                                                                                                                        ……
provide ancillary functions such as notification of a message                                               Application Environment
                                                                                                            Application Environment                              Application Environment
                                                                                                                                                                 Application Environment                                                       Environment
                                                                                                                                                                                                                                               Environment

                                                                                                                         P2P Application Service API
                                                                                                                         P2P Application Service API
forwarding error, a keep-alive of a peer-to-peer session and the                                                                                                                                                         Application functions
                                                                                                                                                                                                                         Application functions
                                                                                                                            P2P Application Services
                                                                                                                            P2P Application Services
first peer-to-peer node discovery.                                                                           General function
                                                                                                             General function                            Mobile Proxy Function
                                                                                                                                                         Mobile Proxy Function
                                                                                                                                                                                                             Instant
                                                                                                                                                                                                              Instant
                                                                                                                                                                                                           messaging
                                                                                                                                                                                                           messaging
                                                                                                                                                                                                                            Metadata
                                                                                                                                                                                                                             Metadata
                                                                                                                                                                                                                              Search
                                                                                                                                                                                                                              Search           …
                                                                                                                                                                                                                                               …           Other
                                                                                                                                                                                                                                                            Other
                                                                                                                                                                                                           functions        functions                    functions
                                                                                                                                                                                                                                                          functions
                                                                                                        --Participation in Peer-to-Peer network
                                                                                                         Participation in Peer- to-
                                                                                                                            Peer-to-Peer network         --UserProfile Management
                                                                                                                                                          User Profile Management                           functions        functions
                                                                                                        --PeerDiscovery & connection
                                                                                                         Peer Discovery & connection                     --Transcoding
                                                                                                                                                          Transcoding
                                                                                                        --Multicast group Setting
                                                                                                         Multicast group Setting                         --ProtocolConversion
                                                                                                                                                          Protocol Conversion


C.   An example of protocol sequences                                                                                        P2P Communication Service API
                                                                                                                             P2P Communication Service API                                                                       P2P Application Protocols
                                                                                                                                                                                                                                 P2P Application Protocols
                                                                                                                                 P2P Communication Services
                                                                                                                                 P2P Communication Services
   Fig. 7. shows a message exchange sequence when a peer-to-                                                  P2P Basic
                                                                                                               P2P Basic          P2P Basic Service
                                                                                                                                   P2P Basic Service
                                                                                                                                                        P2P Multicast
                                                                                                                                                         P2P Multicast       P2P Multicast
                                                                                                                                                                              P2P Multicast      P2P Control
                                                                                                                                                                                                  P2P Control
                                                                                                                                                                                                                          Instant
                                                                                                                                                                                                                           Instant
                                                                                                                                                                                                                         Messaging
                                                                                                                                                                                                                         Messaging
                                                                                                                                                                                                                                         Metadata
                                                                                                                                                                                                                                         Metadata
                                                                                                                                                                                                                                          Search
                                                                                                                                                                                                                                           Search    …
                                                                                                                                                                                                                                                     …
                                                                                                                                                                                                                                                              Other
                                                                                                                                                                                                                                                               Other
                                                                                                                                                                                                                                                             Protocol
                                                                                                            Communication
                                                                                                            Communication                              Communication
                                                                                                                                                       Communication                                                      Protocol       Protocol            Protocol
                                                                                                                                      Protocol                             Service Protocol    Message Protocol           Protocol        Protocol
peer node participates in a peer-to-peer network and joins a                                                   Protocol
                                                                                                                Protocol
                                                                                                                                       Protocol            Protocol
                                                                                                                                                            Protocol
                                                                                                                                                                            Service Protocol   Message Protocol




                                                                                                                                                                                P2P Core API
                                                                                                                                                                                P2P Core API
multicast group. Node A sends a Lookfor message using P2P                                                                                                                           P2P Core Protocol
                                                                                                                                                                                    P2P Core Protocol

broadcast and receives the corresponding LookforResponse
                                                                                                                                           Fig. 8. Software architecture
messages. Node A sends a Hello message to one of discovered
nodes to participate in a peer-to-peer network. If Node A sends
a Hello message to Node B, Node A then establishes a peer-to-                           B.    Mobile peer-to-peer instant message
peer session with Node B and exchanges its own resource                                    We have developed some peer-to-peer applications over the
information each other. Peer-to-peer nodes may exchange their                           mobile peer-to-peer platform. In this section, we describe P2P
own resource information. And then Node A sends a                                       Instant Message application using peer-to-peer multicast. This
ResourceInformationRequest message using P2P broadcast to                               application illustrated in Fig 9., realizes instant message
search a member node of a certain multicast group. If Node A                            without central server. Each peer-to-peer node manages
finds a member node, it sends a Join message to the member                              information of other peer-to-peer nodes and their users. Users
node and receives a JoinResponse message from it. At last,                              join a certain peer-to-peer multicast group to share presence
Node A has joined a certain multicast group.                                            information among the members of multicast group and
                                                                                        perform the exchange of an instant message using P2P
multicast or unicast. Additionally, this application is resilient to                           message corresponds to the P2P core protocol, and the second
failure of peer-to-peer node through a recovery mechanism of                                   part corresponds to the application protocol.
mobile peer-to-peer multicast. This application might show
                                                                                                     P2PFRM 92
                                                                                                     P2PFRM 92
behavior and good usage of peer-to-peer multicast.                                                   Source: Node ID of source node
                                                                                                     Source: Node ID of source node
                                                                                                     MulticastGroupID: ID of multicast group
                                                                                                     MulticastGroupID: ID of multicast group
                                                                                                     ApplicationURI: http://www.mml.yrp.nttdocomo.co.jp/ED/2003/03/p2p_instantmsg_app
                                                                                                     ApplicationURI: http://www.mml.yrp.nttdocomo.co.jp/ED/2003/03/p2p_instantmsg_app
                              Hello!
                                                                                                     InstantMessage
                                                                                                      InstantMessage
                                                           Mary
                                                                                                     UserMessage: Hello All!
                                                                                                      UserMessage: Hello All!
              Peer-to-peer                                                       Kate
                                                                                                     FRMEND
                                                                                                      FRMEND
               multicast          Bob
             network layer                                                        Jack
                                          John                                                      Fig. 12. A sample of P2P message for cellular Phone
                                                                    Becky
              Peer-to-peer
                network                                                                                                         V. CONCLUSION
                 layer

                                                                                                 We presented a mobile peer-to-peer architecture that allows a
               Fig. 9. P2P Instant Message application                                         variety of devices to communicate each other using XML based
                                                                                               peer-to-peer protocols. In this architecture, a mobile device can
  The protocol of this application has been designed as follows.                               be incorporated into a peer-to-peer network via a mobile proxy.
Table I shows the P2P Instant Message Protocol. It consists of                                 The seamless interconnection of nodes across various networks
two methods: Presence method and Instant Message method.                                       such as Internet and ad-hoc networks can be achieved using our
                            TABLE II                                                           peer-to-peer technology. We also described the current status of
        METHODS AND MESSAGES OF P2P INSTANT MESSAGE PROTOCOL                                   our prototype development. Currently, we are designing the
        Protocol                       Method                   Message                        APIs needed for peer-to-peer application developments.
        P2P Instant Message            Presence method          PresenceInformationAdvertise
        Protocol
                                                                PresenceInformationRequest
                                                                                                  Peer-to-peer security is now a topic we are interesting. In
                                                                PresenceInformationResponse    future ubiquitous communication environment, a lot of devices
                                       Instant Message method   InstantMessage                 freely communicate with one another. Peer-to-peer security will
                                                                                               be an important issue for such an environment. We are
   The Presence method has three messages that are                                             considering the incorporation of peer-to-peer security into our
PresenceInformationAdvertise,    PresenceInfromationRequest                                    mobile peer-to-peer architecture. Additionally, we continue to
and PresenceInformationResponse messages. A Presence-                                          develop new mobile peer-to-peer applications and will evaluate
InfromationAdvertise message is used to inform other users of                                  efficiency and performance of our peer-to-peer protocols.
sits presence. The PresenceInfromationRequest and Presence-
Infromation-Response messages are used to exchange presence
                                                                                                                                VI. REFERENCES
information between users. The Following is a sample of a
PresenceInformationAdvertise message.                                                          [1] NTT DoCoMo, Inc., "i-mode",
                                                                                                   http://www.nttdocomo.co.jp/english/i/index.html.
             <PresenceInformationAdvertise>
             <PresenceInformationAdvertise>
              <PresenceDataStatus>Join</PresenceDataStatus>
               <PresenceDataStatus>Join</PresenceDataStatus>
              <PresenceData>
                                                                                               [2] Gnutella, http://gnutella.wego.com/.
               <PresenceData>
               <UserName>Johan</UserName>
                <UserName>Johan</UserName>
               <UserStatus>Very busy</UserStatus>
                <UserStatus>Very busy</UserStatus>
                                                                                               [3] NAPSTER, http://www.napster.com/.
              </PresenceData>
               </PresenceData>
             </PresenceInfromationAdvertise>
             </PresenceInfromationAdvertise>                                                   [4] WinMX, http://www.frontcode.com/.
                                                                                               [5] FREENET, http://frenet.sourceforge.net/.
         Fig. 10. A sample of PresenceInformationAdvertise
                                                                                               [6] GROOVE, http://www.groove.net/.
   The Instant Message method has one message that is an                                       [7] Sun Microsystems, "Project JXTA", http://wwwjxta.org/
InstantMessage message. An InstantMessage message is used                                      [8] NTT DoCoMo, Inc., “FOMA (Freedom Of Mobile
to send an instant message to other nodes.                                                         multimedia Access)”, http://foma.nttdocomo.co.jp/English/.
C.   Simple P2P Protocol for Cellular Phones                                                   [9] J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek,
                                                                                                   and J. W. O'Toole Jr., “Overcast: Reliable multicasting
  We have designed the P2P protocol for cellular phones with a                                     with an overlay network,” Operating System Design and
simple text format over HTTP, since they can only support                                          Implementation (OSDI), Oct. 2000.
HTTP and can not process the protocol based on XML. The
P2P protocol for cellular phones is provided by mobile proxy.                                  [10] Y. Chawathe, S. McCanne, and E. A. Brewer, "An
Each mobile proxy acts as a virtual peer-to-peer node for a                                         architecture for internet content distribution as an
cellular phone and converts the XML based P2P protocol to the                                       infrastructure service", Feb. 2000, Unpublished work.
simple P2P protocol for the cellular phone. An example of a                                    [11] Yang-hua Chu, Sanjay G. Rao and Hui Zhang, "A Case
P2P message for cellular phone is shown in Figure 12. A                                             For End System Multicast", Proceedings of ACM
message included in the HTTP body, is written in a simple text                                      SIGMETRICS, Santa Clara,CA, Jun. 2000.
format and is composed of two parts. The first part of the

More Related Content

What's hot

Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...Going LTE
 
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALVIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALEman Kanjo
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
4G LTE Paper Group 9
4G LTE Paper Group 94G LTE Paper Group 9
4G LTE Paper Group 9eel4514team9
 
Er Wi Fi Integration Ericsson Info Tech Middle East
Er Wi Fi Integration Ericsson Info Tech Middle EastEr Wi Fi Integration Ericsson Info Tech Middle East
Er Wi Fi Integration Ericsson Info Tech Middle EastAli Shoaee
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Dialogic Inc.
 
VoIP: Consumer Market Trends
VoIP: Consumer Market TrendsVoIP: Consumer Market Trends
VoIP: Consumer Market TrendsAlex Gault
 

What's hot (19)

Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...
Future Technologies and Testing for Fixed Mobile Convergence,SAE and LTE in C...
 
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALVIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRAL
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
NEMO
NEMONEMO
NEMO
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
4 g technology
4 g technology4 g technology
4 g technology
 
X25119123
X25119123X25119123
X25119123
 
Ch2
Ch2Ch2
Ch2
 
4G LTE Paper Group 9
4G LTE Paper Group 94G LTE Paper Group 9
4G LTE Paper Group 9
 
Singapore's Next Generation Broadband Network
Singapore's Next Generation Broadband NetworkSingapore's Next Generation Broadband Network
Singapore's Next Generation Broadband Network
 
Er Wi Fi Integration Ericsson Info Tech Middle East
Er Wi Fi Integration Ericsson Info Tech Middle EastEr Wi Fi Integration Ericsson Info Tech Middle East
Er Wi Fi Integration Ericsson Info Tech Middle East
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Lte us 2010 s niri
Lte us 2010 s niriLte us 2010 s niri
Lte us 2010 s niri
 
ATCA's Big Femtocell Opportunity
ATCA's Big Femtocell OpportunityATCA's Big Femtocell Opportunity
ATCA's Big Femtocell Opportunity
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
4G recommendation
4G recommendation4G recommendation
4G recommendation
 
211
211211
211
 
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)Get Ready for the Next Generation Diameter Signaling Controller (DSC)
Get Ready for the Next Generation Diameter Signaling Controller (DSC)
 
VoIP: Consumer Market Trends
VoIP: Consumer Market TrendsVoIP: Consumer Market Trends
VoIP: Consumer Market Trends
 

Viewers also liked

Manual de segurança operaciomal ing
Manual de segurança operaciomal ingManual de segurança operaciomal ing
Manual de segurança operaciomal ingfredystrike
 
Revisiting the Borlaug hypothesis
Revisiting the Borlaug hypothesisRevisiting the Borlaug hypothesis
Revisiting the Borlaug hypothesisFrédéric Baudron
 
Intermediate level of disturbance hypothesis (idh)
Intermediate level of disturbance hypothesis (idh)Intermediate level of disturbance hypothesis (idh)
Intermediate level of disturbance hypothesis (idh)Hotaru Imai
 
Topic Selection
Topic SelectionTopic Selection
Topic SelectionBahadar
 
Test of hypothesis
Test of hypothesisTest of hypothesis
Test of hypothesisvikramlawand
 
EVS - Biodiversity Notes
EVS - Biodiversity NotesEVS - Biodiversity Notes
EVS - Biodiversity NotesArzoo Sahni
 

Viewers also liked (9)

Manual de segurança operaciomal ing
Manual de segurança operaciomal ingManual de segurança operaciomal ing
Manual de segurança operaciomal ing
 
Revisiting the Borlaug hypothesis
Revisiting the Borlaug hypothesisRevisiting the Borlaug hypothesis
Revisiting the Borlaug hypothesis
 
Intermediate level of disturbance hypothesis (idh)
Intermediate level of disturbance hypothesis (idh)Intermediate level of disturbance hypothesis (idh)
Intermediate level of disturbance hypothesis (idh)
 
Unit 3 Biodiversity Management
Unit 3   Biodiversity ManagementUnit 3   Biodiversity Management
Unit 3 Biodiversity Management
 
Topic Selection
Topic SelectionTopic Selection
Topic Selection
 
Biodiversity
Biodiversity Biodiversity
Biodiversity
 
Test of hypothesis
Test of hypothesisTest of hypothesis
Test of hypothesis
 
PPT OF BIODIVERSITY
PPT OF BIODIVERSITYPPT OF BIODIVERSITY
PPT OF BIODIVERSITY
 
EVS - Biodiversity Notes
EVS - Biodiversity NotesEVS - Biodiversity Notes
EVS - Biodiversity Notes
 

Similar to Takeshi kato

Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Cisco Service Provider
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Uvaraj Shan
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networksijtsrd
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksIOSR Journals
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Firetide Q4 Update
Firetide Q4 UpdateFiretide Q4 Update
Firetide Q4 UpdateFiretide
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET Journal
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
 

Similar to Takeshi kato (20)

Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...Node selection in Peer-to-Peer content sharing service in mobile cellular net...
Node selection in Peer-to-Peer content sharing service in mobile cellular net...
 
Parking
ParkingParking
Parking
 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc NetworksService Based Content Sharing in the Environment of Mobile Ad-hoc Networks
Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Firetide Q4 Update
Firetide Q4 UpdateFiretide Q4 Update
Firetide Q4 Update
 
D0362035
D0362035D0362035
D0362035
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

Takeshi kato

  • 1. A Platform and Applications for Mobile Peer-to-Peer Communications Takeshi Kato Norihiro Ishikawa Hiromitsu Sumino NTT DoCoMo Inc. 3-5, Hikarino-oka, Yokosuka Kanagawa JAPAN Johan Hjelm Ye Yu Shingo Murakami Ericsson Research Ericsson Research Japan Torshamnsgatan 23, Kista SE-16480 3-4, Hikarino-oka, Yokosuka Stockholm Sweden Kanagawa JAPAN Abstract-The peer-to-peer service has entered the public terminal capabilities. This should be taken into account when limelight over the last few years. Several research projects are developing systems which will work in a mobile environment. underway on peer-to-peer technologies, but no definitive Additionally, various wireless have been emerging of network conclusion is currently available. Comparing to traditional server- environments such as IMT-2000 (International Mobile client technology on the Internet, the peer-to-peer technology has Telecommunications-2000, for example FOMA [8]), Wireless capabilities to realize highly scalable, extensible and efficient LAN and Bluetooth, and users can select them to satisfy their distributed applications. At the same time mobile networks such as network demands. In the near future, an environment where i-mode, WAP, wireless LAN and Bluetooth have been developing many sensors, users and different kind of objects exist, move at breakneck speed. Demand for using peer-to-peer applications and communicate with one another, called “ubiquitous over PDAs and cellular phones is increasing. The purpose of this communication environment”, will appear. study is to explore a mobile peer-to-peer network architecture In fact, peer-to-peer technology is one of the most important where a variety of devices communications each other over a and suitable networking technologies for ubiquitous variety of networks. In this paper, we propose the architecture communications since it supports easily one-to-one well-adapted to mobile devices and mobile network. The key communication between devices, free and extensible features of this architecture are 1) supporting for multicast distribution of resources and distributed search for enormous communication; 2) incorporating a mobile devices into a peer-to- amount of resources. peer network; 3) XML-based protocol which has readability and extensibility. In this architecture we have been designing P2P The principal goal of our work is thus to design a mobile protocols using XML and algorithms for controlling the mobile peer-to-peer architecture and a general peer-to-peer platform peer-to-peer network. We are currently designing Java APIs that enhances communication capabilities for mobile clients, by needed for the mobile peer-to-peer applications. We have been utilizing network resources efficiently and supporting mobility implementing the mobile peer-to-peer network prototype system in an integrated and practical way. and some peer-to-peer applications. The rest of this paper is organized as follows. Section 2 gives I. INTRODUCTION an overview of our peer-to-peer architecture, describes each key element of our architecture, i.e., multicast communication In the cooperated network, the server-client technology has and Mobile device adaptation. Section 3 describes the protocol been used as the traditional way to handle network resources design. We report the current status of our prototyping and provide Internet services. It has advantages to regulate implementation in section 4. Finally, a conclusion is given in Internet services by only maintain limited number of central section 5. servers. However some major concerns have been raised, for example overload and expensive operation cost of the central II. ARCHITECTURE servers, needs of mutual and direct communications between network users. As a result, peer-to-peer technology has become A. Architecture overview popular and has been used in networks which manage vast amounts of data daily, and balance the load over a large number The proposed mobile peer-to-peer architecture is shown in of servers. Peer-to-peer applications such as distributed search Fig. 1. All of the peer-to-peer communication entities that have applications [2], file sharing system [3] [4], distributed storage a common set of interest and obey a common set of policies system [5] and group ware [6] have been proposed and construct one peer-to-peer community. This architecture developed. Additionally, a generalized platform for peer-to- consists of the following basic components: peer applications has been proposed [7] and developed. Peer-to-peer node: The peer-to-peer node is an independent At the same time, mobile Internet services have become very communication entity in the peer-to-peer network. It can be a popular. In the past four years, the market of mobile Internet mobile device, a PDA, a personal computer, a server or a services has considerably grown successful in Japan where i- workstation, or any of a variety of devices. mode is the most famous example. The mobile environment is different from the fixed Internet in that it is an extremely Mobile proxy: Theoretically, all the mobile devices (e.g. WAP constrained environment, in terms of both communication and or i-mode terminals) can be independent nodes in the peer-to-
  • 2. peer architecture. However some of them are functionally optimization, node authentication and multicast group limited and can not act as autonomous nodes. The mobile proxy management. is a function in a node, which acts as a proxy for the mobile Gateway node: Gateway node is a connection entity linking devices with constrained capability, so that these mobile between a pure peer-to-peer network and a hybrid peer-to-peer devices can join the peer-to-peer architecture. network. It provides for nodes in pure peer-to-peer network Peer-to-peer community with several proxy functions such as routing information Control node Peer-to-peer node provision, node authentication, and multicast group management. Pure peer-to-peer Pure peer-to-peer A control node receives a request from a peer-to-peer node Hybrid peer-to-peer and provides it with routing information, topology optimization Gateway node function and security function. A gateway node collects Gateway node Peer-to-peer node Mobile Proxy Peer-to-peer node topology information on a pure peer-to-peer network and Cellular Phone reports it to the control node. A peer-to-peer node in a hybrid peer-to-peer network reports its existence and adjacent nodes to Fig. 1. The mobile peer-to-peer architecture the control node and can efficiently communicate with each other by using the routing information provided by the control Based these basic components, the hybrid peer-to-peer node. A gateway node supports the seamless communication network administrated by a control node (central point) and the between a node in a pure peer-to-peer network and a node in a pure peer-to-peer network without a control node, are defined. hybrid peer-to-peer network. Control node Peer-to-peer node B. Peer-to-peer multicast communication In peer-to-peer networks, multicast communication is available for a variety of applications, such as communications Peer-to-peer node among work group members in group ware applications and so (a) Pure peer-to-peer architecture (b) Hybrid peer-to-peer architecture on. Peer-to-peer multicast architecture is represented in Fig. 3. Fig. 2. Pure peer-to-peer and hybrid peer-to-peer As shown in this figure, a multicast network overlays a peer-to- peer network. Multicast forwarding is carried out by multi-hop Pure peer-to-peer architecture: There are only peer-to-peer or multi-destination unicast in a peer-to-peer network. nodes in the pure peer-to-peer architecture. The proposed pure Therefore it is not necessarily for all nodes in peer-to-peer peer-to-peer architecture is shown in Fig. 2 (a). The connection network have to support multicast. between peer-to-peer nodes is established on their mutual trust. Each peer-to-peer node is an independent entity and can Peer-to-peer multicast participate in and leave the peer-to-peer network at its network layer convenience. Messages are sent from a peer-to-peer node to Peer-to-peer another one directly or by passing them via some intermediary network layer peer-to-peer nodes. Hybrid peer-to-peer architecture: The hybrid peer-to-peer Multi-hop unicast Multi-destination unicast architecture resolves the disadvantages of the pure peer-to-peer Fig. 3. Peer-to-peer multicast mechanism architecture such as inefficient routing, splits of network and Fig. 4 shows the peer-to-peer multicast path construction lack of security, by introducing a control node. The proposed procedure. When a peer-to-peer node tries to join a certain hybrid peer-to-peer architecture is shown Fig. 2 (b). In our multicast group, (1) a peer-to-peer node sends a join message to architecture, the control node provides the functions for the nearest member node. (2) The nearest member node sends providing routing information to a destination node, back a join response message to it and (3) the two nodes discovering the first peer-to-peer node, recovering from the establish the relationship regarding the multicast group. (4) splitting of the peer-to-peer network, improving the network After that, a multicast message propagates along the multicast topology and security such as authentication, in order to paths. In the pure peer-to-peer architecture, a node looks for the improve the inefficiency of the pure peer-to-peer architecture. nearest member node using a flooding message when it tries to To realize the hybrid peer-to-peer architecture, the control join a multicast group. In the hybrid peer-to-peer architecture, a node and the gateway node are defined. control node informs a node of the nearest member node in response to the node’s request. Control node: Control node is an administrative entity which manages a peer-to-peer community in the peer-to-peer network. Peer-to-peer multicast is similar to ALM (Application layer It provides several functions independent of particular multicast) [9] [10] [11]. These forwarding mechanisms might applications such as name resolution, route information be adopted in peer-to-peer multicast with some modifications. provision, the first per-to-peer discovery, network topology Additionally, bi-directional shared minimum spanning tree
  • 3. might be well-suited for peer-to-peer multicast because many into a message of a peer-to-peer protocol. In Fig. 5 (c), a pair of peer-to-peer nodes tend to be senders. MST (Minimum a mobile device and a proxy function constructs a peer-to-peer Spanning Tree) has the property that sum total of distances node in the peer-to-peer architecture. In this case, a mobile among all nodes are minimized. Therefore, each distance device has its own node name, and acts as a separate node between nodes is well optimized. through a mobile proxy. The mobile proxy does not act as an (4) Multicast message independent node. It will be decided by requirements of peer- (3) The two nodes make a propagate along multicast paths to-peer applications, as to which type of mobile proxy model relationship Peer-to-peer will be preferable. multicast network layer (2) The nearest member node sends a join response message Peer-to-peer network layer III. PROTOCOL DESIGN (1) Sending a join message to a A. Protocol overview nearest member node Fig. 6. shows the protocol stack. The proposed protocols Fig. 4. Procedure of joining multicast group have been designed over HTTP, TCP and Bluetooth in two layers. P2P Core Protocol is defined to process peer-to-peer C. Mobile device adaptation message based on peer-to-peer communication model, six Another distinct characteristic of this architecture is that it protocols realizing peer-to-peer multicast, communication with allows mobile devices to take part in the peer-to-peer network a control node and control of a peer-to-peer session and so on via a mobile proxy node. While a mobile device, such as a are defined over the P2P Core Protocol. Based on the layered cellular phone, may have enough capabilities to act as an approach of the protocol design, it is easy to design a new P2P independent peer-to-peer node in the future, it still has the application protocol based on the requirements of peer-to-peer following limitations at this time: applications. Furthermore, the proposed protocols are defined • Limited storage using XML. Since XML has a capability to design general tree- • Small runtime heap structured data, it is possible to design complicated protocol • Modest processor performance messages required by peer-to-peer applications, and layered • Constrained electrical power protocols independently using XML Namespace. Therefore Thus, a current mobile device can’t fully perform the role of XML is well suitable to design such an application protocol. a peer-to-peer node that offers services to other peer-to-peer P2P Basic Communication P2P Basic Service P2P Multicast Communication P2PMulticast Service P2P Control Message P2P Application nodes in a peer-to-peer network. In order to incorporate a Protocol Protocol Protocol Protocol Protocol Protocols mobile device into a peer-to-peer network, some functions must P2P Core Protocol be done by other nodes on behalf of a mobile device. Through HTTP No-IP the cooperation of a mobile proxy, a mobile device can TCP (Bluetooth) IP virtually act as a peer-to-peer node and can perform the Network necessary functions in the peer-to-peer architecture. From the Fig. 6. Protocol stack point of view of the peer-to-peer architecture, mobile devices are modeled in the three ways. Mobile Proxy (Node A) Mobile Proxy B. P2P Protocols Mobile A Node A (Mobile A) The P2P Core Protocol has been designed to process a peer- Proxy Function Node B Node C to-peer message according to peer-to-peer communication Mobile B (Mobile B) model. We defined three message types to realize peer-to-peer (a) Type 1 (b) Type 2 communication. Request and response messages are defined for Mobile Proxy Node A the reactive communication mode and advertise message is Proxy Mobile A Function A defined for proactive communication mode. Additionally, we Node B Proxy defined three communication types: unicast, multicast and Mobile B Function B broadcast. A unicast message is sent to the destination node (c) Type 3 directly, using multi-hop unicast or multi-destination unicast. Fig. 5. Mobile proxy architecture When a node receives a multicast message from a multicast member node, it forwards the received message to remaining In Fig. 5 (a), mobile devices share the same proxy node. adjacent member nodes using multi-hop unicast. A node sends From the point of view of the network, the mobile proxy acts as a broadcast message to all adjacent nodes. The forwarding of a one peer-to-peer node. In Fig. 5 (b), a mobile device has its broadcast message is controlled by its hop count. Since the own node name and acts as a separate peer-to-peer node in the naming and the message routing mechanism of the P2P Core peer-to-peer architecture. For realizing this type of mobile Protocol are defined to be independent of transport protocols, proxy, some proxy functions should be implemented on Node C the P2P core protocol can be defined over various transport such as transforming a message received from a mobile device
  • 4. protocols. Table I shows protocols defined over the P2P Core Node A Node B Node C ……… Node X Protocol. Looking for Lookfor Connection establishment peer- node TABLE I LookforResponse METHODS AND MESSAGES LookforResponse LookforResponse Protocol Method Message Connecting Hello first peer P2P Basic Hello method Hello node Communication HelloResponse Protocol HelloResponse Connection establishment Bye method Bye ResourceInformation Exchanging Resource Information ResourceInformationAdvertise Resource Exchange method Advertise Information ResourceInformationRequest ResourceInformation ResourceInformationResponse Advertise P2P Basic Service Service Provide method ServiceAdvertise Protocol ResourceInformation Searching ServiceRequest Request multicast group ServiceResponse member ResourceInformation P2P Multicast Join method Join Response Communication Protocol JoinResponse Join Establishing Leave method Leave adjacent relationship P2P Multicast Service Multicast Service MulticastServiceAdvertise JoinResponse Protocol Provide method MulticastServiceRequest Multicast Connection establishment MulticastServiceResponse P2P Control Message Protocol Error Report method ErrorReport Fig. 7. Example of sequence Diagnose method Diagnose DiagnoseResponse Lookfor method Lookfor IV. PROTOTYPE IMPLEMENTATION LookforResponse A. Tools and Open APIs The P2P Basic Protocol is defined to realize the We are currently implementing a prototype for the peer-to- establishment and the release of a peer-to-peer session. The P2P peer node, the gateway node and the control node. All nodes Multicast Communication Protocol is defined to construct a are implemented in Java (J2SE 1.3.1) on Microsoft Windows multicast distribution tree among multicast member nodes and 2000 and Red hat Linux 7.2. Protocol APIs have been provided to forward a multicast message over it. In the hybrid peer-to- for application developers. This prototype provides the basic peer architecture, the P2P Basic Service Protocol is used functions of the mobile peer-to-peer protocols and some utility between a peer-to-peer node and a control node to efficiently tools. Fig. 8. shows the API design within a peer-to-peer node. enhance communications between peer-to-peer nodes. We prepared three levels of API. The application developers Additionally, the P2P Multicast Communication Protocol is can easily design a new P2P Application Protocol for a certain used between a peer-to-peer node and a control node to application using these APIs. efficiently enhance multicast communication between peer-to- Application Environment Application Environment peer nodes. The P2P Control Message Protocol is defined to Instant Messaging Instant Messaging Metadata Search Metadata Search Other Application Other Application …… …… provide ancillary functions such as notification of a message Application Environment Application Environment Application Environment Application Environment Environment Environment P2P Application Service API P2P Application Service API forwarding error, a keep-alive of a peer-to-peer session and the Application functions Application functions P2P Application Services P2P Application Services first peer-to-peer node discovery. General function General function Mobile Proxy Function Mobile Proxy Function Instant Instant messaging messaging Metadata Metadata Search Search … … Other Other functions functions functions functions --Participation in Peer-to-Peer network Participation in Peer- to- Peer-to-Peer network --UserProfile Management User Profile Management functions functions --PeerDiscovery & connection Peer Discovery & connection --Transcoding Transcoding --Multicast group Setting Multicast group Setting --ProtocolConversion Protocol Conversion C. An example of protocol sequences P2P Communication Service API P2P Communication Service API P2P Application Protocols P2P Application Protocols P2P Communication Services P2P Communication Services Fig. 7. shows a message exchange sequence when a peer-to- P2P Basic P2P Basic P2P Basic Service P2P Basic Service P2P Multicast P2P Multicast P2P Multicast P2P Multicast P2P Control P2P Control Instant Instant Messaging Messaging Metadata Metadata Search Search … … Other Other Protocol Communication Communication Communication Communication Protocol Protocol Protocol Protocol Service Protocol Message Protocol Protocol Protocol peer node participates in a peer-to-peer network and joins a Protocol Protocol Protocol Protocol Protocol Service Protocol Message Protocol P2P Core API P2P Core API multicast group. Node A sends a Lookfor message using P2P P2P Core Protocol P2P Core Protocol broadcast and receives the corresponding LookforResponse Fig. 8. Software architecture messages. Node A sends a Hello message to one of discovered nodes to participate in a peer-to-peer network. If Node A sends a Hello message to Node B, Node A then establishes a peer-to- B. Mobile peer-to-peer instant message peer session with Node B and exchanges its own resource We have developed some peer-to-peer applications over the information each other. Peer-to-peer nodes may exchange their mobile peer-to-peer platform. In this section, we describe P2P own resource information. And then Node A sends a Instant Message application using peer-to-peer multicast. This ResourceInformationRequest message using P2P broadcast to application illustrated in Fig 9., realizes instant message search a member node of a certain multicast group. If Node A without central server. Each peer-to-peer node manages finds a member node, it sends a Join message to the member information of other peer-to-peer nodes and their users. Users node and receives a JoinResponse message from it. At last, join a certain peer-to-peer multicast group to share presence Node A has joined a certain multicast group. information among the members of multicast group and perform the exchange of an instant message using P2P
  • 5. multicast or unicast. Additionally, this application is resilient to message corresponds to the P2P core protocol, and the second failure of peer-to-peer node through a recovery mechanism of part corresponds to the application protocol. mobile peer-to-peer multicast. This application might show P2PFRM 92 P2PFRM 92 behavior and good usage of peer-to-peer multicast. Source: Node ID of source node Source: Node ID of source node MulticastGroupID: ID of multicast group MulticastGroupID: ID of multicast group ApplicationURI: http://www.mml.yrp.nttdocomo.co.jp/ED/2003/03/p2p_instantmsg_app ApplicationURI: http://www.mml.yrp.nttdocomo.co.jp/ED/2003/03/p2p_instantmsg_app Hello! InstantMessage InstantMessage Mary UserMessage: Hello All! UserMessage: Hello All! Peer-to-peer Kate FRMEND FRMEND multicast Bob network layer Jack John Fig. 12. A sample of P2P message for cellular Phone Becky Peer-to-peer network V. CONCLUSION layer We presented a mobile peer-to-peer architecture that allows a Fig. 9. P2P Instant Message application variety of devices to communicate each other using XML based peer-to-peer protocols. In this architecture, a mobile device can The protocol of this application has been designed as follows. be incorporated into a peer-to-peer network via a mobile proxy. Table I shows the P2P Instant Message Protocol. It consists of The seamless interconnection of nodes across various networks two methods: Presence method and Instant Message method. such as Internet and ad-hoc networks can be achieved using our TABLE II peer-to-peer technology. We also described the current status of METHODS AND MESSAGES OF P2P INSTANT MESSAGE PROTOCOL our prototype development. Currently, we are designing the Protocol Method Message APIs needed for peer-to-peer application developments. P2P Instant Message Presence method PresenceInformationAdvertise Protocol PresenceInformationRequest Peer-to-peer security is now a topic we are interesting. In PresenceInformationResponse future ubiquitous communication environment, a lot of devices Instant Message method InstantMessage freely communicate with one another. Peer-to-peer security will be an important issue for such an environment. We are The Presence method has three messages that are considering the incorporation of peer-to-peer security into our PresenceInformationAdvertise, PresenceInfromationRequest mobile peer-to-peer architecture. Additionally, we continue to and PresenceInformationResponse messages. A Presence- develop new mobile peer-to-peer applications and will evaluate InfromationAdvertise message is used to inform other users of efficiency and performance of our peer-to-peer protocols. sits presence. The PresenceInfromationRequest and Presence- Infromation-Response messages are used to exchange presence VI. REFERENCES information between users. The Following is a sample of a PresenceInformationAdvertise message. [1] NTT DoCoMo, Inc., "i-mode", http://www.nttdocomo.co.jp/english/i/index.html. <PresenceInformationAdvertise> <PresenceInformationAdvertise> <PresenceDataStatus>Join</PresenceDataStatus> <PresenceDataStatus>Join</PresenceDataStatus> <PresenceData> [2] Gnutella, http://gnutella.wego.com/. <PresenceData> <UserName>Johan</UserName> <UserName>Johan</UserName> <UserStatus>Very busy</UserStatus> <UserStatus>Very busy</UserStatus> [3] NAPSTER, http://www.napster.com/. </PresenceData> </PresenceData> </PresenceInfromationAdvertise> </PresenceInfromationAdvertise> [4] WinMX, http://www.frontcode.com/. [5] FREENET, http://frenet.sourceforge.net/. Fig. 10. A sample of PresenceInformationAdvertise [6] GROOVE, http://www.groove.net/. The Instant Message method has one message that is an [7] Sun Microsystems, "Project JXTA", http://wwwjxta.org/ InstantMessage message. An InstantMessage message is used [8] NTT DoCoMo, Inc., “FOMA (Freedom Of Mobile to send an instant message to other nodes. multimedia Access)”, http://foma.nttdocomo.co.jp/English/. C. Simple P2P Protocol for Cellular Phones [9] J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O'Toole Jr., “Overcast: Reliable multicasting We have designed the P2P protocol for cellular phones with a with an overlay network,” Operating System Design and simple text format over HTTP, since they can only support Implementation (OSDI), Oct. 2000. HTTP and can not process the protocol based on XML. The P2P protocol for cellular phones is provided by mobile proxy. [10] Y. Chawathe, S. McCanne, and E. A. Brewer, "An Each mobile proxy acts as a virtual peer-to-peer node for a architecture for internet content distribution as an cellular phone and converts the XML based P2P protocol to the infrastructure service", Feb. 2000, Unpublished work. simple P2P protocol for the cellular phone. An example of a [11] Yang-hua Chu, Sanjay G. Rao and Hui Zhang, "A Case P2P message for cellular phone is shown in Figure 12. A For End System Multicast", Proceedings of ACM message included in the HTTP body, is written in a simple text SIGMETRICS, Santa Clara,CA, Jun. 2000. format and is composed of two parts. The first part of the