ABSTRACT
Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencies that diminish their ability to support this domain, such as inflexibility in terms of discovery protocols, network usage, and data transports. We have developed the Speakeasy framework, which addresses these issues, and supports these types of applications. We show how Speakeasy addresses the shortcomings of current peer-to-peer systems, and describe a demonstration application, called Casca, that supports ad hoc peer-to-peer collaboration by taking advantages of the mechanisms provided by Speakeasy.
- Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C., Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. Proceedings of Network and Distributed System Security Symposium (NDSS), (San Diego, CA, USA, 2002).]]Google Scholar
- Bellotti, V. Design for Privacy in Multimedia Computing and Communications Environments. in Rotenberg, M. ed. Technology and Privacy: The New Landscape, MIT Press, Cambridge, MA, 1997, 62--98.]] Google ScholarDigital Library
- Bellotti, V. and Edwards, W.K. Intelligibility and Accountability: Human Considerations in Context Aware Systems. Jour. of Human Computer Interaction, 16:2-4. 2001.]]Google ScholarDigital Library
- Breidenbach, S. Peer-to-peer potential Network World, 2001.]]Google Scholar
- Cohen, J., Out to lunch: Further adventures monitoring background activity. Proceedings of ICAD 94, International Conference on Auditory Display, (Santa Fe, NM, USA, 1994), Santa Fe Institute, 15--20.]]Google Scholar
- Dourish, P. and Bellotti, V., Awareness and Coordination in Shared Workspaces. Proceedings of ACM Conference on Computer-Supported Cooperative Work (CSCW ), (Toronto, Canada., 1992), ACM Press, 107--114.]] Google ScholarDigital Library
- Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F. and Izadi, S., Challenge: Recombinant Computing and the Speakeasy Approach. Proceedings of The Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), (Atlanta, GA USA, 2002).]] Google ScholarDigital Library
- Gnutella. http://www.Gnutella.com, 2002.]]Google Scholar
- Goland, Y.Y., Cai, T., Leach, P., Gu, Y. and Albright, S. Simple Service Discovery Protocol/1.0: Operating Without an Arbiter. Internet Engineering Task Force Internet Draft. 1999.]]Google Scholar
- Gong, L. Project JXTA: A Technology Overview. Sun Microsystems, Inc. April 25, 2001.]]Google Scholar
- Groove Networks Inc. http://www.Groove.com, 2002.]]Google Scholar
- Litiu, R. and Prakash, A., Developing Adaptive Groupware Applications Using a Mobile Component Framework. Proceedings of Computer Supported Cooperative Work (CSCW), (Phil., PA, USA, 2000), ACM Press, 107--116.]] Google ScholarDigital Library
- Napster. http://www.Napster.com, 2002.]]Google Scholar
- Newman, M.W., Izadi, S., Edwards, W.K., Smith, T.F. and Sedivy, J.Z., User Interfaces When and Where They are Needed: An Infrastructure for Recombinant Computing. Proceedings of Symposium on User Interface Software and Technology (UIST), (Paris, France, 2002), ACM.]] Google ScholarDigital Library
- Newman, M.W., Sedivy, J.Z., Edwards, W.K., Smith, T.F., Marcelo, K., Neuwirth, C.M., Hong, J.I. and Izadi, S., Designing for Serendipity: Supporting End-User Configuration of Ubiquitous Computing Environments. Proceedings of Designing Interactive Systems (DIS), (London, UK, 2002), 147--156.]] Google ScholarDigital Library
- Palm, I. Bluetooth: Connecting Palm Powered(r) Handhelds. October 22, 2001.]]Google Scholar
- Palm Inc. Palm Bluetooth Card, 2002.]]Google Scholar
- Roseman, M. and Greenberg, S. Building Real Time Groupware with GroupKit, A Groupware Toolkit. ACM Transactions on Computer Human Interaction, 3 (1). 1996. 66--106.]] Google ScholarDigital Library
- Scannell, E. Wall Street firms embrace WorldStreet's p-to-p offerings InfoWorld, 2001.]]Google Scholar
- Smetters, D.K. and Grinter, R.E., Moving from the Design of Usable Security Technology to the Design of Useful Secure Applications. Proceedings of New Security Paradigms Workshop, (Norfolk, VA, 2002), ACM.]] Google ScholarDigital Library
- Sun Microsystems. Jini Discovery and Join Specification. January, 1999.]]Google Scholar
- Sun Microsystems. Network File System Protocol Specification (RFC 1049). 1989.]] Google ScholarDigital Library
- Universal Description Discovery and Integration Consortium. UDDI Technical Whitepaper. September 6, 2000.]]Google Scholar
- Waldo, J. The Jini Architecture for Network-centric Computing Communications of the ACM, 42:7, 1999, 76--82.]] Google ScholarDigital Library
- Wollrath, A., Riggs, R. and Waldo, J. A Distributed Object Model for the Java System. USENIX Computing Sys., 9. 1996.]] Google ScholarDigital Library
- WorldStreet. http://wwWorldStreet.com, 2002.]]Google Scholar
Index Terms
- Using speakeasy for ad hoc peer-to-peer collaboration
Recommendations
Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks
Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-peer (P2P) networks due to its increased resiliency and efficiency when compared to client-server approaches. P2P networks are usually divided into two types, ...
A peer-to-peer overlay approach for emergency mobile ad hoc network based multimedia communications
Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications ConferenceOverlay networks are located on top of the physical network and are generally favored for the implementation of peer-to-peer (P2P) networks providing services such as voice over IP (VoIP) communications. The operation of the overlay network results in ...
Exploiting the synergy between peer-to-peer and mobile ad hoc networks
HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9We argue that there exists a synergy between peer-to-peer (p2p) overlay networks for the Internet and mobile ad hoc networks (MANETs) connecting mobile nodes communicating with each other via multi-hop wireless links-both share the key characteristics ...
Comments