Mobile Peer-to-Peer over Session Initiation Protocol

نویسندگان

  • Juuso Aleksi Lehtinen
  • Raimo Kantola
چکیده

of the Licentiate's Thesis In my Master's Thesis, we presented how a mobile peer-to-peer file-sharing application can be implemented using the Session Initiation Protocol (SIP) as the underlying signaling protocol. The main objective of this thesis is to evaluate what kind of special requirements mobile environment poses for peer-to-peer application design, and present how peer-to-peer based services can be efficiently realized in next-generation mobile networks by using SIP with some enhancements as the peer-to-peer signaling protocol. This thesis is divided into two parts. In the first part, we present different peer-to-peer architectures and search algorithms, and evaluate their suitability for mobile use. We also review some mobile peer-to-peer middleware and file-sharing applications. Then, in the second part, we present our hybrid mobile peer-to-peer architecture consisting of a Symbian based mobile client and a SIP Application Server based super-peer. Key findings of this thesis are that the mobile peer-to-peer application based on SIP signaling and hybrid peer-to-peer architecture is suitable for mobile use as it minimizes overhead in mobile nodes and allows mobile operator to have control on its users in multi-operator environment. Also, the performance of the application satisfies user requirements. Avainsanat: mobiilivertaisverkot, session initiation protocol, istunnon aloitusprotokollaan pohjautuvat mobiilivertaisverkot iii " Every accomplishment starts with the decision to try. " Unknown source iv Acknowledgements

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Suitability of Dht-based Peer-to-peer Session Initiation Protocol for Wireless Distributed Services

Providing both analytical and empirical results, we analyze the suitability of DHT-based Peer-to-Peer Session Initiation Protocol (P2PSIP) overlay networking as a substrate for wireless, distributed multimedia services. Session initiation is just one application of this framework. First, we discuss the potential of P2PSIP for different applications and analyze the security and reliability of P2...

متن کامل

Performance of REsource LOcation and Discovery (RELOAD) on Mobile Phones

REsource LOcation And Discovery (RELOAD) is a peer-to-peer signaling protocol that can be used to maintain an overlay network, and to store data in and retrieve data from the overlay. RELOAD is currently being standardized in the Internet Engineering Task Force (IETF). The main application using RELOAD is Peer-to-Peer Session Initiation Protocol (P2PSIP). In this paper, we study the performance...

متن کامل

Wireless Terminal Management Architectures

The advent of multi-technology networks offering ubiquitous services over advanced wireless network infrastructure demands an integrated management approach. We address in this paper an integrated management approach for wireless and mobile infrastructures by analysing the particularities of this environment and proposing a management architecture based on application based overlay networks. Ou...

متن کامل

State-of-the-art Sip for Mobile Application Supernetworking

This paper introduces the current state-of-the-art of SIP (Session Initiation Protocol) and the use of SIP in supporting P2P (peer-to-peer) applications on mobile phones. The use of SIP in All-IP mobile phones is a step toward achieving supernetworking, providing the user with powerful yet conceptually simple tools for sending and receiving multimedia content over a wireless network. The analys...

متن کامل

Session-Based Service Discovery and Access Control in Peer-to-Peer Communications

Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or acce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008