Super nodes positioning for P2P IP telephony over wireless ad-hoc networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

IP Telephony is a potential killer application among the various multimedia applications and services. It is therefore natural to expect support for these services over new network architectures like wireless ad-hoc networks. Despite the proliferation of IP Telephony services in the Internet, the traditional client/server models that have been used are found to be highly inefficient for wireless ad-hoc networks as compared to peer-to-peer (P2P) models. On the other hand, P2P strategies require some tuning to work well in wireless ad-hoc networks. In this paper, we discuss some undesirable situation that may happen if P2P systems are deployed over wireless ad-hoc networks without adaptation. We then define our strategies for positioning Super Nodes in the physical network underlay as well as P2P ID space according to the constraints of these network technologies. We evaluate the efficiency of our approche in reducing the session establishment time and request failure rate as two important criteria for the performance of IP telephony systems.

Original languageEnglish
Title of host publicationProceedings - MUM 2007
Subtitle of host publication6th International Conference on Mobile and Ubiquitous Multimedia
Pages84-89
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2007
Externally publishedYes
Event6th International Conference on Mobile and Ubiquitous Multimedia, MUM 2007 - Oulu, Finland
Duration: 12 Dec 200714 Dec 2007

Publication series

NameProceedings - MUM 2007: 6th International Conference on Mobile and Ubiquitous Multimedia
Volume284

Conference

Conference6th International Conference on Mobile and Ubiquitous Multimedia, MUM 2007
Country/TerritoryFinland
CityOulu
Period12/12/0714/12/07

Keywords

  • DHT
  • IP Telephony
  • P2P

Fingerprint

Dive into the research topics of 'Super nodes positioning for P2P IP telephony over wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this