Seamless Group Reformation in WiFi Peer to Peer Network using Dormant Backend Links

被引:0
|
作者
Chaki, Prakash [1 ]
Yasuda, Masato [1 ]
Fujita, Norihito [1 ]
机构
[1] NEC Corp Ltd, Cloud Syst Res Labs, Kawasaki, Kanagawa, Japan
关键词
WiFi Direct; Peer to peer(P2P); Group Owner; Group Reformation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi Peer to Peer (P2P) aka WiFi Direct enables devices to communicate with each other in a peer to peer manner without requiring any Access Point at typical WiFi speed with WPA2 security. With its huge prospect in revolutionizing device to device communication, WiFi P2P can potentially play a much larger role amid the growing interest in M2M communication and Internet of Things. However, unlike a conventional P2P network which operates on mesh topology, WiFi P2P requires one of its group members to act as Group Owner, with whom all the other devices in the group stay associated. The group suffers from a temporary network disruption when the Group Owner suddenly leaves the group without any prior notice. In addition, restoration of the group connectivity consumes much time which is intolerable for most delay sensitive applications. In this paper, we address this issue using our proposed concept of Seamless Group Reformation which helps in maintaining near continuous connectivity and alleviates overdependence of the group on the Group Owner. The concept is seconded by the proposed mechanism of Dormant Backend Links to cut down the total group-disruption time. We implement the mechanism of Dormant Backend Links on a practical WiFi P2P testbed and present an experimental evaluation.
引用
收藏
页码:773 / 778
页数:6
相关论文
共 50 条
  • [1] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [3] Using bidirectional links to improve peer-to-peer lookup performance
    Jiang J.-J.
    Tang F.-L.
    Pan F.
    Wang W.-N.
    Journal of Zhejiang University-SCIENCE A, 2006, 7 (6): : 945 - 951
  • [4] Using peer-to-peer technology for network forensics
    Redding, S
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
  • [5] Super-Peer Selection in Peer-to-Peer Networks using Network Coordinates
    Merz, Peter
    Priebe, Matthias
    Wolf, Steffen
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 385 - 390
  • [6] An Implementation of Reliable Group Communication based on the Peer-to-Peer Network JXTA
    Loesing, Karsten
    Wirtz, Guido
    3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [7] Game platform using peer-to-peer overlay network
    Yuan, Pingpeng
    Liu, Wei
    Yao, Hong
    Liao, Xiaofei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2008, 36 (01): : 41 - 43
  • [8] Trust estimation in peer-to-peer network using BLUE
    Ruchir Gupta
    Yatindra Nath Singh
    Antriksh Goswami
    Peer-to-Peer Networking and Applications, 2021, 14 : 888 - 897
  • [9] Group-based peer-to-peer network routing and searching rules
    Wu, WG
    Hu, WH
    Huang, YX
    Qian, DP
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 509 - 514
  • [10] Adaptive peer-to-peer network using semantic relations
    Forstner, B
    Charaf, H
    ICCC 2005: IEEE 3rd International Conference on Computational Cybernetics, 2005, : 195 - 199