Seamless Group Reformation in WiFi Peer to Peer Network using Dormant Backend Links

被引:0
|
作者
Chaki, Prakash [1 ]
Yasuda, Masato [1 ]
Fujita, Norihito [1 ]
机构
[1] NEC Corp Ltd, Cloud Syst Res Labs, Kawasaki, Kanagawa, Japan
来源
2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE | 2015年
关键词
WiFi Direct; Peer to peer(P2P); Group Owner; Group Reformation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi Peer to Peer (P2P) aka WiFi Direct enables devices to communicate with each other in a peer to peer manner without requiring any Access Point at typical WiFi speed with WPA2 security. With its huge prospect in revolutionizing device to device communication, WiFi P2P can potentially play a much larger role amid the growing interest in M2M communication and Internet of Things. However, unlike a conventional P2P network which operates on mesh topology, WiFi P2P requires one of its group members to act as Group Owner, with whom all the other devices in the group stay associated. The group suffers from a temporary network disruption when the Group Owner suddenly leaves the group without any prior notice. In addition, restoration of the group connectivity consumes much time which is intolerable for most delay sensitive applications. In this paper, we address this issue using our proposed concept of Seamless Group Reformation which helps in maintaining near continuous connectivity and alleviates overdependence of the group on the Group Owner. The concept is seconded by the proposed mechanism of Dormant Backend Links to cut down the total group-disruption time. We implement the mechanism of Dormant Backend Links on a practical WiFi P2P testbed and present an experimental evaluation.
引用
收藏
页码:773 / 778
页数:6
相关论文
共 50 条
  • [31] Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
    Gupta, Ruchir
    Singh, Yatindra Nath
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (10) : 2812 - 2823
  • [32] A search for routing strategies in a peer-to-peer network using genetic programming
    Iles, M
    Deugo, D
    21ST IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 341 - 346
  • [33] Using peer-to-peer method to build global computing overlay network
    Li, AP
    Dou, W
    Jia, Y
    Wang, HM
    Wu, QY
    PROGRESS IN INTELLIGENCE COMPUTATION & APPLICATIONS, 2005, : 662 - 668
  • [34] Modelling and Simulation of Peer-to-Peer Overlay Network Protocols Using OverSim
    Moorhouse, Jamie
    Liu, Lu
    Li, Zhiyuan
    Ding, Zhijun
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 144 - 149
  • [35] Network-Mediated Peer Group Image Measurement
    Freedman, Henry
    Crean, Peter
    Dundas, Peter
    TAGA: TECHNICAL ASSOCIATION OF THE GRAPHIC ARTS, 2018, PROCEEDINGS, 2018, : 170 - 179
  • [36] Using semantic links to support top-K join queries in peer-to-peer networks
    Liu, Jie
    Feng, Liang
    Zhuge, Hai
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (15): : 2031 - 2046
  • [37] Peer-to-Peer Content Multicast Using Off-Peak Periods in Wireless Access Links
    Ogino, Nagao
    Ano, Shigehiro
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (11) : 2845 - 2855
  • [38] Peer-to-Peer Real-Time Group Communication over Content-Centric Network
    Luk, Vincent Wing-Hei
    Wong, Albert Kai-Sun
    Lea, Chin-Tau
    Lu, Li
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2012,
  • [39] Secured Categorization and Group Encounter Based Dissemination of Post Disaster Situational Data Using Peer-to-Peer Delay Tolerant Network
    Basu, Souvik
    Roy, Siuli
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 747 - 755
  • [40] Attribute-Based Authenticated Group Key Management Protocol for Mobile Peer-to-Peer Network
    Zhang Guoyin
    Fu Xiaojing
    Ma Chunguang
    CHINA COMMUNICATIONS, 2012, 9 (10) : 68 - 77