Seamless Group Reformation in WiFi Peer to Peer Network using Dormant Backend Links

被引:0
|
作者
Chaki, Prakash [1 ]
Yasuda, Masato [1 ]
Fujita, Norihito [1 ]
机构
[1] NEC Corp Ltd, Cloud Syst Res Labs, Kawasaki, Kanagawa, Japan
来源
2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE | 2015年
关键词
WiFi Direct; Peer to peer(P2P); Group Owner; Group Reformation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi Peer to Peer (P2P) aka WiFi Direct enables devices to communicate with each other in a peer to peer manner without requiring any Access Point at typical WiFi speed with WPA2 security. With its huge prospect in revolutionizing device to device communication, WiFi P2P can potentially play a much larger role amid the growing interest in M2M communication and Internet of Things. However, unlike a conventional P2P network which operates on mesh topology, WiFi P2P requires one of its group members to act as Group Owner, with whom all the other devices in the group stay associated. The group suffers from a temporary network disruption when the Group Owner suddenly leaves the group without any prior notice. In addition, restoration of the group connectivity consumes much time which is intolerable for most delay sensitive applications. In this paper, we address this issue using our proposed concept of Seamless Group Reformation which helps in maintaining near continuous connectivity and alleviates overdependence of the group on the Group Owner. The concept is seconded by the proposed mechanism of Dormant Backend Links to cut down the total group-disruption time. We implement the mechanism of Dormant Backend Links on a practical WiFi P2P testbed and present an experimental evaluation.
引用
收藏
页码:773 / 778
页数:6
相关论文
共 50 条
  • [41] Supporting dynamic group decision and negotiation processes: A traceability augmented peer-to-peer network approach
    Mohan, Kannan
    Xu, Peng
    Ramesh, Balasubramaniam
    INFORMATION & MANAGEMENT, 2006, 43 (05) : 650 - 662
  • [42] A survey and comparison of peer-to-peer group communication systems suitable for network-centric warfare
    Anwar, Z
    Yurcik, W
    Campbell, RH
    DEFENSE TRANSFORMATION AND NETWORK-CENTRIC SYSTEMS, 2005, 5820 : 33 - 44
  • [43] Finding peer-to-peer file-sharing using coarse network behaviors
    Collins, Michael P.
    Reiter, Michael K.
    Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 1 - 17
  • [44] Using Intelligent Agent Technique to Setup and Administer Mobile Peer-to-peer Network
    Liang, Ye
    Ci, Lin-lin
    He, Hui
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 5, PROCEEDINGS, 2008, : 500 - +
  • [45] Locating XML Documents in a Peer-to-Peer Network Using Distributed Hash Tables
    Rao, Praveen R.
    Moon, Bongki
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (12) : 1737 - 1752
  • [46] Genius: Peer-to-peer location-aware gossip using network coordinates
    Ning, N
    Wang, DS
    Ma, YQ
    Hu, JF
    Sun, J
    Gao, CN
    Zheng, WM
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 163 - 170
  • [47] Federated Document Search Using Hybrid Peer-to-peer Network for Plagiarism Detection
    Priambodo, Widyanto Bagus
    Guarddin, Gladhi
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2016, : 61 - 66
  • [48] AN ANALYSIS OF A PEER NETWORK USING PSYCHEDELIC DRUGS
    FOULKS, EF
    EISENMAN, R
    PSYCHIATRIC QUARTERLY, 1969, 43 (03) : 389 - &
  • [49] PEER-TO-PEER COLLABORATIVE LEARNING WITH E-BOOK DEVICES OVER 3G-WIFI AD-HOC NETWORK
    Goh, Tiong-Thye
    Seet, Boon-Chong
    CSEDU 2010: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED EDUCATION, VOL 1, 2010, : 262 - 267
  • [50] Network analysis in a peer-to-peer energy trading model using blockchain and machine learning
    Shukla, Saurabh
    Hussain, Shahid
    Irshad, Reyazur Rashid
    Alattab, Ahmed Abdu
    Thakur, Subhasis
    Breslin, John G.
    Hassan, M. Fadzil
    Abimannan, Satheesh
    Husain, Shahid
    Jameel, Syed Muslim
    COMPUTER STANDARDS & INTERFACES, 2024, 88