SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Design and Analysis of a Mobile
File Sharing
BY:
SADIQUE NAYEEM
(PONDICHERRY UNIVERSITY)
Outline
• Design and analyze a mobile file sharing system
over opportunistic networks using Bluetooth
technology.
• To enable a mobile device to download desired
files from available devices in its neighborhood and
also allow its files to be disseminated to the
network with the facilitation of opportunistic
contacts.
• The key challenges to be address are system
automation and file sharing efficiency.
Opportunistic networks
• Now a days many devices can support spontaneous
interaction among mobile users through wireless
links, such as Bluetooth and Wi-Fi. The resulted
network is often referred as an opportunistic
network(Oppnet). In these networks, contacts
among users are usually opportunistic and
connections among devices are intermittent.
Basic
operational
phases in an
Oppnet.
File Sharing
File sharing scenario of the system can be described as follows:
• Mobile devices search for available devices in their
neighborhoods.
• Request for file sharing services
• Establish the connection
• At the same time, these mobile devices serve as service
providers and respond to requests sent from their neighbors
• The Transaction can be
• File Pulling
• File Pushing
File Pulling & File Pushing
• File pulling is to download files from neighbors.
• File pushing is to distribute files(Ex- Conference)
• There are two different pairs of roles in our file
sharing system:
• (puller, pullee)
• (pusher, pushee)
• Puller is the one who requests for pulling service and
desires to download files from the service provider called
pullee.
• Pusher is the one who requests for pushing services and
wants to distribute its owned files to the service provider
named pushee.
ROLES RELATIONSHIP
File Sharing
Pusher(Responder)
Pullee (Responder)
Pushee (Requester)
Puller (Requester)
Download
Mobile File Sharing
System for Opportunistic Networks
The mobile file sharing system includes three
main components:
• Connectivity mechanism
• Download control and
• Break handling.
System Overview
Connectivity mechanism
The connectivity mechanism is designed to
handle connection for a mobile device for its
diverse roles.
• Device discovery
• Neighbor selection
• Connection establishment.
Connectivity mechanism - Device discovery
• Bluetooth technology for short range communication
which scans for available devices in the neighborhood
periodically.
• Experimentally the device discover neighbors within 17
seconds if there exists at least one in the neighborhood.
Connectivity mechanism -Neighbor selection
• Once available neighbors are discovered
• The neighbor selection strategy is applied for file puller and
pusher to choose a neighbor.
• The file puller maintains a list locally which traces all the
mobile devices that have unfinished file transferring in
their last connections with the puller.
• If such neighbor is found then file transferring completes
successfully .
• Else the file puller chooses the connection candidate from
all available neighbors randomly.
Connectivity mechanism - Neighbor selection
• A file pusher also maintains a list locally which
records all the mobile devices which it has pushed
its files.
• If discovered neighbors exist in the list, the file
pusher will avoid selecting them as connection
candidate, since pusher does not want to push files
to the same device repeatedly.
• Then the file pusher chooses the connection
candidate randomly from all the other available
ones.
Connectivity mechanism - Connection Establishment 1
The system involves two pairs of roles i.e (puller, pullee) and
(pusher, pushee) and connection only occurs between
puller and pullee or pusher and pushee respectively.
• For the pair of file puller and pullee, search criterion is
used to announce its file requirement including file types it
requests. ie. jpeg, .mp3 etc.
• search criterion is send to file pullee
• file pullee accepts the service request if at least one file in
its possession meets the criterion and sends back
acceptance notice with its provided files information.
• After receiving the acceptance notice from file pullee,the
connection b/w puller and pullee is established
successfully.
Connectivity mechanism - Connection Establishment - 2
• For file pusher and pushee, the pushed file information is
used by the pusher to announce files that it desires to
distribute to the network.
• The file pusher sends out pushing request along with the
pushed file information.
• A selected neighbor acting as file pushee accepts the
service request and sends back an acceptance notice.
• The connection is announced to be established
successfully.
ROLES AND FILE INFORMATION LISTS
Each mobile device is capable of serving up to 4 types of
roles whose connection processes for file puller, pullee,
pusher and pushee can be described by the following four
Algorithm.
Download Control
After the connection established, download control
handles file transferring process. The challenge of
download control is
• To reduce file transferring duration
• Improve file sharing efficiency
As puller and pushee are the ones that download files
from pullee and pusher, they can customize their
download sequences with the help of prioritizing
sequence of these files.
PRIORITIZED DOWNLOAD SEQUENCE
Piece Information
• The puller or pushee breaks all the prioritized files that are
about to be downloaded into certain size of pieces.
• Piece information is recorded in a meta file.
• Using file piece has two advantages.
– Firstly, it allows a file to be downloaded from multiple devices as
a device can request different pieces of a file from multiple
devices simultaneously.
– Secondly, it facilitates connection break handling.
• Similar to connectivity mechanism, download control
manages the downloads for the mobile device in different
roles and the download control processes can be described
by the following Algorithm.
Connection Break Handling
• Due to device mobility in opportunistic networks,
opportunistic contacts occur and disappear
frequently. As a result the transfer of data is not
completed successfully. Here the break handler
works which store all existing pieces of unfinished
files temporarily and request for the rest pieces
when the connection is rebuilt.
EVALUATION - I
The file transferring data rate – limiting the peer number to 4
will maximize the data rate
EVALUATION - II
The time taken to merge pieces into a file is minimal when the
file piece size is 100 KB.
EVALUATION - III
File compression is applied on the file provider to reduce file size,
thereby reducing the file transferring duration.
The time taken to download files can be reduced significantly for some
file types, such as .txt and .bmp.
EVALUATION - IV
Finally the whole system efficiency is measured considering
the time taken not only for the file transferring but also the
preparation operations before the transferring and the merging
afterwards.
•Preparation operations includes
•discovering neighbors
•establishing connection with the selected neighbor
•Initiation work in download control.
EVALUATION - V
The time taken to transfer files and merge pieces into files are
directly related to the file size
CONCLUSION
• The mobile file sharing system proposed in this paper provides
an efficient solution for mobile devices in opportunistic
networks to acquire interested files from neighbors and also
distribute files to the network. It is implemented on HP iPAQ
910 smart phones equipped with Bluetooth interfaces. It
allows one mobile device to download or upload files from or
to multiple neighbors and achieves up to 417 KB per second
data rate for file transferring. It is indicated that limiting the
peer number to 4 maximizes the data rate and enhances the
system efficiency. The use of file piece enables connection
break handling. It is clearly shown that file piece with 100 KB
size can minimize the extra time cost according to our
experiment results.
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (17)

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Communications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologiesCommunications made easy_spectrumtechnologies
Communications made easy_spectrumtechnologies
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
Communications
CommunicationsCommunications
Communications
 
Communications
CommunicationsCommunications
Communications
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Network layer
Network layerNetwork layer
Network layer
 
This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...This presentation uploaded by me makesame for software testing tools used for...
This presentation uploaded by me makesame for software testing tools used for...
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 

Andere mochten auch

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2Ritul Sonania
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEEMEMTECHSTUDENTPROJECTS
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platformwebuiltit
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharingKhagendra Chapre
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer SystemsUwe Schmidt
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyBelLa Bhe
 

Andere mochten auch (8)

P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2P2P file sharing over GPRS network using Motorola RAZR2
P2P file sharing over GPRS network using Motorola RAZR2
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
FYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android PlatformFYP: Peer-to-Peer Communications Framework on Android Platform
FYP: Peer-to-Peer Communications Framework on Android Platform
 
Multicast chat with file and desktop sharing
Multicast chat with file and desktop sharingMulticast chat with file and desktop sharing
Multicast chat with file and desktop sharing
 
Methods of research
Methods of researchMethods of research
Methods of research
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Crime file
Crime fileCrime file
Crime file
 
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS TechnologyThesis in IT Online Grade Encoding and Inquiry System via SMS Technology
Thesis in IT Online Grade Encoding and Inquiry System via SMS Technology
 

Ähnlich wie Design and analysis of a mobile file sharing system for opportunistic networks

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror serverseSAT Publishing House
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror serverseSAT Journals
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocolNishan Shetty
 
OPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxOPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxPokormanZuda
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkTanveer Malik
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaSDr. Shivashankar
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloudFlavio Vit
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications905426
 
Insights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressInsights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressSovan Kundu
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area NetworkSoumee Maschatak
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basicspkaviya
 

Ähnlich wie Design and analysis of a mobile file sharing system for opportunistic networks (20)

Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Reducing download time through mirror servers
Reducing download time through mirror serversReducing download time through mirror servers
Reducing download time through mirror servers
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
OPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptxOPERATING SYSTEMS PRESENTATION.pptx
OPERATING SYSTEMS PRESENTATION.pptx
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Viloria osi layer4-7
Viloria osi layer4-7Viloria osi layer4-7
Viloria osi layer4-7
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Bit sync personal_cloud
Bit sync personal_cloudBit sync personal_cloud
Bit sync personal_cloud
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Insights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming ProgressInsights on On-demand Media Streaming Progress
Insights on On-demand Media Streaming Progress
 
Advanced Storage Area Network
Advanced Storage Area NetworkAdvanced Storage Area Network
Advanced Storage Area Network
 
IT2255 Web Essentials - Unit I Website Basics
IT2255 Web Essentials - Unit I  Website BasicsIT2255 Web Essentials - Unit I  Website Basics
IT2255 Web Essentials - Unit I Website Basics
 

Mehr von sadique_ghitm

Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behavioursadique_ghitm
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular languagesadique_ghitm
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagramssadique_ghitm
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)sadique_ghitm
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...sadique_ghitm
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...sadique_ghitm
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approachessadique_ghitm
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfacesadique_ghitm
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks sadique_ghitm
 

Mehr von sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Kürzlich hochgeladen

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Kürzlich hochgeladen (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Design and analysis of a mobile file sharing system for opportunistic networks

  • 1. Design and Analysis of a Mobile File Sharing BY: SADIQUE NAYEEM (PONDICHERRY UNIVERSITY)
  • 2. Outline • Design and analyze a mobile file sharing system over opportunistic networks using Bluetooth technology. • To enable a mobile device to download desired files from available devices in its neighborhood and also allow its files to be disseminated to the network with the facilitation of opportunistic contacts. • The key challenges to be address are system automation and file sharing efficiency.
  • 3. Opportunistic networks • Now a days many devices can support spontaneous interaction among mobile users through wireless links, such as Bluetooth and Wi-Fi. The resulted network is often referred as an opportunistic network(Oppnet). In these networks, contacts among users are usually opportunistic and connections among devices are intermittent.
  • 5. File Sharing File sharing scenario of the system can be described as follows: • Mobile devices search for available devices in their neighborhoods. • Request for file sharing services • Establish the connection • At the same time, these mobile devices serve as service providers and respond to requests sent from their neighbors • The Transaction can be • File Pulling • File Pushing
  • 6. File Pulling & File Pushing • File pulling is to download files from neighbors. • File pushing is to distribute files(Ex- Conference) • There are two different pairs of roles in our file sharing system: • (puller, pullee) • (pusher, pushee)
  • 7. • Puller is the one who requests for pulling service and desires to download files from the service provider called pullee. • Pusher is the one who requests for pushing services and wants to distribute its owned files to the service provider named pushee. ROLES RELATIONSHIP
  • 8. File Sharing Pusher(Responder) Pullee (Responder) Pushee (Requester) Puller (Requester) Download
  • 9. Mobile File Sharing System for Opportunistic Networks The mobile file sharing system includes three main components: • Connectivity mechanism • Download control and • Break handling.
  • 11. Connectivity mechanism The connectivity mechanism is designed to handle connection for a mobile device for its diverse roles. • Device discovery • Neighbor selection • Connection establishment.
  • 12. Connectivity mechanism - Device discovery • Bluetooth technology for short range communication which scans for available devices in the neighborhood periodically. • Experimentally the device discover neighbors within 17 seconds if there exists at least one in the neighborhood.
  • 13. Connectivity mechanism -Neighbor selection • Once available neighbors are discovered • The neighbor selection strategy is applied for file puller and pusher to choose a neighbor. • The file puller maintains a list locally which traces all the mobile devices that have unfinished file transferring in their last connections with the puller. • If such neighbor is found then file transferring completes successfully . • Else the file puller chooses the connection candidate from all available neighbors randomly.
  • 14. Connectivity mechanism - Neighbor selection • A file pusher also maintains a list locally which records all the mobile devices which it has pushed its files. • If discovered neighbors exist in the list, the file pusher will avoid selecting them as connection candidate, since pusher does not want to push files to the same device repeatedly. • Then the file pusher chooses the connection candidate randomly from all the other available ones.
  • 15. Connectivity mechanism - Connection Establishment 1 The system involves two pairs of roles i.e (puller, pullee) and (pusher, pushee) and connection only occurs between puller and pullee or pusher and pushee respectively. • For the pair of file puller and pullee, search criterion is used to announce its file requirement including file types it requests. ie. jpeg, .mp3 etc. • search criterion is send to file pullee • file pullee accepts the service request if at least one file in its possession meets the criterion and sends back acceptance notice with its provided files information. • After receiving the acceptance notice from file pullee,the connection b/w puller and pullee is established successfully.
  • 16. Connectivity mechanism - Connection Establishment - 2 • For file pusher and pushee, the pushed file information is used by the pusher to announce files that it desires to distribute to the network. • The file pusher sends out pushing request along with the pushed file information. • A selected neighbor acting as file pushee accepts the service request and sends back an acceptance notice. • The connection is announced to be established successfully.
  • 17. ROLES AND FILE INFORMATION LISTS Each mobile device is capable of serving up to 4 types of roles whose connection processes for file puller, pullee, pusher and pushee can be described by the following four Algorithm.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Download Control After the connection established, download control handles file transferring process. The challenge of download control is • To reduce file transferring duration • Improve file sharing efficiency As puller and pushee are the ones that download files from pullee and pusher, they can customize their download sequences with the help of prioritizing sequence of these files.
  • 24. Piece Information • The puller or pushee breaks all the prioritized files that are about to be downloaded into certain size of pieces. • Piece information is recorded in a meta file. • Using file piece has two advantages. – Firstly, it allows a file to be downloaded from multiple devices as a device can request different pieces of a file from multiple devices simultaneously. – Secondly, it facilitates connection break handling. • Similar to connectivity mechanism, download control manages the downloads for the mobile device in different roles and the download control processes can be described by the following Algorithm.
  • 25.
  • 26.
  • 27.
  • 28. Connection Break Handling • Due to device mobility in opportunistic networks, opportunistic contacts occur and disappear frequently. As a result the transfer of data is not completed successfully. Here the break handler works which store all existing pieces of unfinished files temporarily and request for the rest pieces when the connection is rebuilt.
  • 29. EVALUATION - I The file transferring data rate – limiting the peer number to 4 will maximize the data rate
  • 30. EVALUATION - II The time taken to merge pieces into a file is minimal when the file piece size is 100 KB.
  • 31. EVALUATION - III File compression is applied on the file provider to reduce file size, thereby reducing the file transferring duration. The time taken to download files can be reduced significantly for some file types, such as .txt and .bmp.
  • 32. EVALUATION - IV Finally the whole system efficiency is measured considering the time taken not only for the file transferring but also the preparation operations before the transferring and the merging afterwards. •Preparation operations includes •discovering neighbors •establishing connection with the selected neighbor •Initiation work in download control.
  • 33. EVALUATION - V The time taken to transfer files and merge pieces into files are directly related to the file size
  • 34. CONCLUSION • The mobile file sharing system proposed in this paper provides an efficient solution for mobile devices in opportunistic networks to acquire interested files from neighbors and also distribute files to the network. It is implemented on HP iPAQ 910 smart phones equipped with Bluetooth interfaces. It allows one mobile device to download or upload files from or to multiple neighbors and achieves up to 417 KB per second data rate for file transferring. It is indicated that limiting the peer number to 4 maximizes the data rate and enhances the system efficiency. The use of file piece enables connection break handling. It is clearly shown that file piece with 100 KB size can minimize the extra time cost according to our experiment results.