SlideShare a Scribd company logo
Design and Analysis of a Mobile
File Sharing
BY:
SADIQUE NAYEEM
(PONDICHERRY UNIVERSITY)
Outline
• Design and analyze a mobile file sharing system
over opportunistic networks using Bluetooth
technology.
• To enable a mobile device to download desired
files from available devices in its neighborhood and
also allow its files to be disseminated to the
network with the facilitation of opportunistic
contacts.
• The key challenges to be address are system
automation and file sharing efficiency.
Opportunistic networks
• Now a days many devices can support spontaneous
interaction among mobile users through wireless
links, such as Bluetooth and Wi-Fi. The resulted
network is often referred as an opportunistic
network(Oppnet). In these networks, contacts
among users are usually opportunistic and
connections among devices are intermittent.
Basic
operational
phases in an
Oppnet.
File Sharing
File sharing scenario of the system can be described as follows:
• Mobile devices search for available devices in their
neighborhoods.
• Request for file sharing services
• Establish the connection
• At the same time, these mobile devices serve as service
providers and respond to requests sent from their neighbors
• The Transaction can be
• File Pulling
• File Pushing
File Pulling & File Pushing
• File pulling is to download files from neighbors.
• File pushing is to distribute files(Ex- Conference)
• There are two different pairs of roles in our file
sharing system:
• (puller, pullee)
• (pusher, pushee)
• Puller is the one who requests for pulling service and
desires to download files from the service provider called
pullee.
• Pusher is the one who requests for pushing services and
wants to distribute its owned files to the service provider
named pushee.
ROLES RELATIONSHIP
File Sharing
Pusher(Responder)
Pullee (Responder)
Pushee (Requester)
Puller (Requester)
Download
Mobile File Sharing
System for Opportunistic Networks
The mobile file sharing system includes three
main components:
• Connectivity mechanism
• Download control and
• Break handling.
System Overview
Connectivity mechanism
The connectivity mechanism is designed to
handle connection for a mobile device for its
diverse roles.
• Device discovery
• Neighbor selection
• Connection establishment.
Connectivity mechanism - Device discovery
• Bluetooth technology for short range communication
which scans for available devices in the neighborhood
periodically.
• Experimentally the device discover neighbors within 17
seconds if there exists at least one in the neighborhood.
Connectivity mechanism -Neighbor selection
• Once available neighbors are discovered
• The neighbor selection strategy is applied for file puller and
pusher to choose a neighbor.
• The file puller maintains a list locally which traces all the
mobile devices that have unfinished file transferring in
their last connections with the puller.
• If such neighbor is found then file transferring completes
successfully .
• Else the file puller chooses the connection candidate from
all available neighbors randomly.
Connectivity mechanism - Neighbor selection
• A file pusher also maintains a list locally which
records all the mobile devices which it has pushed
its files.
• If discovered neighbors exist in the list, the file
pusher will avoid selecting them as connection
candidate, since pusher does not want to push files
to the same device repeatedly.
• Then the file pusher chooses the connection
candidate randomly from all the other available
ones.
Connectivity mechanism - Connection Establishment 1
The system involves two pairs of roles i.e (puller, pullee) and
(pusher, pushee) and connection only occurs between
puller and pullee or pusher and pushee respectively.
• For the pair of file puller and pullee, search criterion is
used to announce its file requirement including file types it
requests. ie. jpeg, .mp3 etc.
• search criterion is send to file pullee
• file pullee accepts the service request if at least one file in
its possession meets the criterion and sends back
acceptance notice with its provided files information.
• After receiving the acceptance notice from file pullee,the
connection b/w puller and pullee is established
successfully.
Connectivity mechanism - Connection Establishment - 2
• For file pusher and pushee, the pushed file information is
used by the pusher to announce files that it desires to
distribute to the network.
• The file pusher sends out pushing request along with the
pushed file information.
• A selected neighbor acting as file pushee accepts the
service request and sends back an acceptance notice.
• The connection is announced to be established
successfully.
ROLES AND FILE INFORMATION LISTS
Each mobile device is capable of serving up to 4 types of
roles whose connection processes for file puller, pullee,
pusher and pushee can be described by the following four
Algorithm.
Download Control
After the connection established, download control
handles file transferring process. The challenge of
download control is
• To reduce file transferring duration
• Improve file sharing efficiency
As puller and pushee are the ones that download files
from pullee and pusher, they can customize their
download sequences with the help of prioritizing
sequence of these files.
PRIORITIZED DOWNLOAD SEQUENCE
Piece Information
• The puller or pushee breaks all the prioritized files that are
about to be downloaded into certain size of pieces.
• Piece information is recorded in a meta file.
• Using file piece has two advantages.
– Firstly, it allows a file to be downloaded from multiple devices as
a device can request different pieces of a file from multiple
devices simultaneously.
– Secondly, it facilitates connection break handling.
• Similar to connectivity mechanism, download control
manages the downloads for the mobile device in different
roles and the download control processes can be described
by the following Algorithm.
Connection Break Handling
• Due to device mobility in opportunistic networks,
opportunistic contacts occur and disappear
frequently. As a result the transfer of data is not
completed successfully. Here the break handler
works which store all existing pieces of unfinished
files temporarily and request for the rest pieces
when the connection is rebuilt.
EVALUATION - I
The file transferring data rate – limiting the peer number to 4
will maximize the data rate
EVALUATION - II
The time taken to merge pieces into a file is minimal when the
file piece size is 100 KB.
EVALUATION - III
File compression is applied on the file provider to reduce file size,
thereby reducing the file transferring duration.
The time taken to download files can be reduced significantly for some
file types, such as .txt and .bmp.
EVALUATION - IV
Finally the whole system efficiency is measured considering
the time taken not only for the file transferring but also the
preparation operations before the transferring and the merging
afterwards.
•Preparation operations includes
•discovering neighbors
•establishing connection with the selected neighbor
•Initiation work in download control.
EVALUATION - V
The time taken to transfer files and merge pieces into files are
directly related to the file size
CONCLUSION
• The mobile file sharing system proposed in this paper provides
an efficient solution for mobile devices in opportunistic
networks to acquire interested files from neighbors and also
distribute files to the network. It is implemented on HP iPAQ
910 smart phones equipped with Bluetooth interfaces. It
allows one mobile device to download or upload files from or
to multiple neighbors and achieves up to 417 KB per second
data rate for file transferring. It is indicated that limiting the
peer number to 4 maximizes the data rate and enhances the
system efficiency. The use of file piece enables connection
break handling. It is clearly shown that file piece with 100 KB
size can minimize the extra time cost according to our
experiment results.
Thank you!

More Related Content

What's hot

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
Pushpa Yakkala
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
Masood Alam Shaikh
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
Srikanth Vanama
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
Manish Sharma
 
Communications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologiesCommunications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologies
Parveen Sultana
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
awais qarni
 
Communications
CommunicationsCommunications
Communications
o.s.shekhawat
 
Communications
CommunicationsCommunications
Communications
T Uppili Srinivasan
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
SridharBR
 
Network layer
Network layerNetwork layer
Network layer
Ahmed_Hamed_Attia
 
This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...
makesame
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
Satyendra Mohan
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
abhipesit
 
Peer topeer
Peer topeerPeer topeer
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
Chandan Balachandra
 

What's hot (17)

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Communications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologiesCommunications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologies
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
Communications
CommunicationsCommunications
Communications
 
Communications
CommunicationsCommunications
Communications
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Network layer
Network layerNetwork layer
Network layer
 
This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 

Viewers also liked

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
Ritul Sonania
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEEMEMTECHSTUDENTPROJECTS
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
webuiltit
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
Khagendra Chapre
 
Methods of research
Methods of researchMethods of research
Methods of research
PhoenixCharm_06
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
Uwe Schmidt
 
Crime file
Crime fileCrime file
Crime file
divy_resting
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
BelLa Bhe
 

Viewers also liked (8)

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 
Methods of research
Methods of researchMethods of research
Methods of research
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Crime file
Crime fileCrime file
Crime file
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
 

Similar to Design and analysis of a mobile file sharing system for opportunistic networks

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
eSAT Publishing House
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
eSAT Journals
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
JVenkateshGoud
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
D bipul lomga
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
Nishan Shetty
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
ssuser8b4eb21
 
OPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxOPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptx
PokormanZuda
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
Tanveer Malik
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
Jhoniel Viloria
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
183JAIDEEP
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
Dr. Shivashankar
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
IJCNCJournal
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
Flavio Vit
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
905426
 
Insights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressInsights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming Progress
Sovan Kundu
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area Network
Soumee Maschatak
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
pkaviya
 

Similar to Design and analysis of a mobile file sharing system for opportunistic networks (20)

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
OPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxOPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptx
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Insights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressInsights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming Progress
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area Network
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 

More from sadique_ghitm

Attitude
AttitudeAttitude
Attitude
sadique_ghitm
 
Personality
PersonalityPersonality
Personality
sadique_ghitm
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
sadique_ghitm
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
sadique_ghitm
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
sadique_ghitm
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
sadique_ghitm
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
sadique_ghitm
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
sadique_ghitm
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
sadique_ghitm
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
sadique_ghitm
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
sadique_ghitm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
sadique_ghitm
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
sadique_ghitm
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
sadique_ghitm
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
sadique_ghitm
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
sadique_ghitm
 

More from sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

Design and analysis of a mobile file sharing system for opportunistic networks

  • 1. Design and Analysis of a Mobile File Sharing BY: SADIQUE NAYEEM (PONDICHERRY UNIVERSITY)
  • 2. Outline • Design and analyze a mobile file sharing system over opportunistic networks using Bluetooth technology. • To enable a mobile device to download desired files from available devices in its neighborhood and also allow its files to be disseminated to the network with the facilitation of opportunistic contacts. • The key challenges to be address are system automation and file sharing efficiency.
  • 3. Opportunistic networks • Now a days many devices can support spontaneous interaction among mobile users through wireless links, such as Bluetooth and Wi-Fi. The resulted network is often referred as an opportunistic network(Oppnet). In these networks, contacts among users are usually opportunistic and connections among devices are intermittent.
  • 5. File Sharing File sharing scenario of the system can be described as follows: • Mobile devices search for available devices in their neighborhoods. • Request for file sharing services • Establish the connection • At the same time, these mobile devices serve as service providers and respond to requests sent from their neighbors • The Transaction can be • File Pulling • File Pushing
  • 6. File Pulling & File Pushing • File pulling is to download files from neighbors. • File pushing is to distribute files(Ex- Conference) • There are two different pairs of roles in our file sharing system: • (puller, pullee) • (pusher, pushee)
  • 7. • Puller is the one who requests for pulling service and desires to download files from the service provider called pullee. • Pusher is the one who requests for pushing services and wants to distribute its owned files to the service provider named pushee. ROLES RELATIONSHIP
  • 8. File Sharing Pusher(Responder) Pullee (Responder) Pushee (Requester) Puller (Requester) Download
  • 9. Mobile File Sharing System for Opportunistic Networks The mobile file sharing system includes three main components: • Connectivity mechanism • Download control and • Break handling.
  • 11. Connectivity mechanism The connectivity mechanism is designed to handle connection for a mobile device for its diverse roles. • Device discovery • Neighbor selection • Connection establishment.
  • 12. Connectivity mechanism - Device discovery • Bluetooth technology for short range communication which scans for available devices in the neighborhood periodically. • Experimentally the device discover neighbors within 17 seconds if there exists at least one in the neighborhood.
  • 13. Connectivity mechanism -Neighbor selection • Once available neighbors are discovered • The neighbor selection strategy is applied for file puller and pusher to choose a neighbor. • The file puller maintains a list locally which traces all the mobile devices that have unfinished file transferring in their last connections with the puller. • If such neighbor is found then file transferring completes successfully . • Else the file puller chooses the connection candidate from all available neighbors randomly.
  • 14. Connectivity mechanism - Neighbor selection • A file pusher also maintains a list locally which records all the mobile devices which it has pushed its files. • If discovered neighbors exist in the list, the file pusher will avoid selecting them as connection candidate, since pusher does not want to push files to the same device repeatedly. • Then the file pusher chooses the connection candidate randomly from all the other available ones.
  • 15. Connectivity mechanism - Connection Establishment 1 The system involves two pairs of roles i.e (puller, pullee) and (pusher, pushee) and connection only occurs between puller and pullee or pusher and pushee respectively. • For the pair of file puller and pullee, search criterion is used to announce its file requirement including file types it requests. ie. jpeg, .mp3 etc. • search criterion is send to file pullee • file pullee accepts the service request if at least one file in its possession meets the criterion and sends back acceptance notice with its provided files information. • After receiving the acceptance notice from file pullee,the connection b/w puller and pullee is established successfully.
  • 16. Connectivity mechanism - Connection Establishment - 2 • For file pusher and pushee, the pushed file information is used by the pusher to announce files that it desires to distribute to the network. • The file pusher sends out pushing request along with the pushed file information. • A selected neighbor acting as file pushee accepts the service request and sends back an acceptance notice. • The connection is announced to be established successfully.
  • 17. ROLES AND FILE INFORMATION LISTS Each mobile device is capable of serving up to 4 types of roles whose connection processes for file puller, pullee, pusher and pushee can be described by the following four Algorithm.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Download Control After the connection established, download control handles file transferring process. The challenge of download control is • To reduce file transferring duration • Improve file sharing efficiency As puller and pushee are the ones that download files from pullee and pusher, they can customize their download sequences with the help of prioritizing sequence of these files.
  • 24. Piece Information • The puller or pushee breaks all the prioritized files that are about to be downloaded into certain size of pieces. • Piece information is recorded in a meta file. • Using file piece has two advantages. – Firstly, it allows a file to be downloaded from multiple devices as a device can request different pieces of a file from multiple devices simultaneously. – Secondly, it facilitates connection break handling. • Similar to connectivity mechanism, download control manages the downloads for the mobile device in different roles and the download control processes can be described by the following Algorithm.
  • 25.
  • 26.
  • 27.
  • 28. Connection Break Handling • Due to device mobility in opportunistic networks, opportunistic contacts occur and disappear frequently. As a result the transfer of data is not completed successfully. Here the break handler works which store all existing pieces of unfinished files temporarily and request for the rest pieces when the connection is rebuilt.
  • 29. EVALUATION - I The file transferring data rate – limiting the peer number to 4 will maximize the data rate
  • 30. EVALUATION - II The time taken to merge pieces into a file is minimal when the file piece size is 100 KB.
  • 31. EVALUATION - III File compression is applied on the file provider to reduce file size, thereby reducing the file transferring duration. The time taken to download files can be reduced significantly for some file types, such as .txt and .bmp.
  • 32. EVALUATION - IV Finally the whole system efficiency is measured considering the time taken not only for the file transferring but also the preparation operations before the transferring and the merging afterwards. •Preparation operations includes •discovering neighbors •establishing connection with the selected neighbor •Initiation work in download control.
  • 33. EVALUATION - V The time taken to transfer files and merge pieces into files are directly related to the file size
  • 34. CONCLUSION • The mobile file sharing system proposed in this paper provides an efficient solution for mobile devices in opportunistic networks to acquire interested files from neighbors and also distribute files to the network. It is implemented on HP iPAQ 910 smart phones equipped with Bluetooth interfaces. It allows one mobile device to download or upload files from or to multiple neighbors and achieves up to 417 KB per second data rate for file transferring. It is indicated that limiting the peer number to 4 maximizes the data rate and enhances the system efficiency. The use of file piece enables connection break handling. It is clearly shown that file piece with 100 KB size can minimize the extra time cost according to our experiment results.