{"title":"Challenges and Protocols for P2P applications in Multi-hop Wireless Networks","authors":"Mahendra Singh, C. Kumar, Prem Nath","doi":"10.1109/ICCMC.2018.8487911","DOIUrl":null,"url":null,"abstract":"P2P (Peer-to-Peer) systems are mainly designed for fixed wired networks and attracted researchers due to increase in the Internet based applications. Wireless multi-hop networks such as mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) share many key characteristics with P2P networks like dynamic overlay, self-organization and decentralization. These networks have high degree of dynamicity due to churn (join and leave) of the nodes in the network. P2P networks suffer from challenges like malicious file spreading, free riding, whitewashing, poor resource search scalability, lack of a robust trust model, etc. The join and leave of the nodes at their will and it makes management of topology management and resource searching more challenging. The wireless multi-hop networks have their own challenges like limited bandwidth, limited backup power, security, overlay maintenance, mobility management, etc. When P2P protocols are implemented for wireless multi-hop networks, more challenges are added. But good thing is the deployment DHT (Distributed Hash Table) based protocols without any changes at network layer of wireless multi-hop networks. The DHT is a resource searching and retrieval mechanism in P2P networks. We have presented a comprehensive survey over the challenges and protocols for wireless multi-hop networks for P2P applications in this paper.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"310-316"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487911","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
P2P (Peer-to-Peer) systems are mainly designed for fixed wired networks and attracted researchers due to increase in the Internet based applications. Wireless multi-hop networks such as mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) share many key characteristics with P2P networks like dynamic overlay, self-organization and decentralization. These networks have high degree of dynamicity due to churn (join and leave) of the nodes in the network. P2P networks suffer from challenges like malicious file spreading, free riding, whitewashing, poor resource search scalability, lack of a robust trust model, etc. The join and leave of the nodes at their will and it makes management of topology management and resource searching more challenging. The wireless multi-hop networks have their own challenges like limited bandwidth, limited backup power, security, overlay maintenance, mobility management, etc. When P2P protocols are implemented for wireless multi-hop networks, more challenges are added. But good thing is the deployment DHT (Distributed Hash Table) based protocols without any changes at network layer of wireless multi-hop networks. The DHT is a resource searching and retrieval mechanism in P2P networks. We have presented a comprehensive survey over the challenges and protocols for wireless multi-hop networks for P2P applications in this paper.