Ring: A cross-layer P2P group conferencing mechanism over mobile ad-hoc networks

Jun Li Kuo*, Chen Hua Shih, Cheng Yuan Ho, Ming Ching Wang, Yaw-Chung Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-toend delay with minimal signaling overhead.

Original languageEnglish
Pages (from-to)2759-2768
Number of pages10
JournalIEICE Transactions on Communications
VolumeE95-B
Issue number9
DOIs
StatePublished - 1 Jan 2012

Keywords

  • Cross-layer design
  • Group conference
  • P2P-MANET
  • P2p live streaming
  • Real-time multimedia service
  • Wireless ad hoc

Fingerprint Dive into the research topics of 'Ring: A cross-layer P2P group conferencing mechanism over mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this