• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    2021-12-14 10:29:02AjayArunachalamVinayakumarRaviMoezKrichenRoobaeaAlroobaeaandJehadSaadAlqurni
    Computers Materials&Continua 2021年7期

    Ajay Arunachalam,Vinayakumar Ravi,Moez Krichen,Roobaea Alroobaea and Jehad Saad Alqurni

    1Centre for Applied Autonomous Sensor Systems(AASS),?rebro University,?rebro,Sweden

    2Center for Artifcial Intelligence,Prince Mohammad Bin Fahd University,Khobar,Saudi Arabia

    3Faculty of CSIT,Al-Baha University,Saudi Arabia ReDCAD Laboratory,University of Sfax,Tunisia

    4Department of Computer Science,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    5Department of Education Technologies,College of Education,Imam Abdulrahman Bin Faisal University,Saudi Arabia

    Abstract: One of the key challenges in ad-hoc networks is the resource discovery problem.How effciently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs), and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive fooding technique foods the network with query messages, while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of fooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article, we mathematically model different widely used existing search techniques, and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different fooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to fnd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process.

    Keywords: Mathematical model; MANET; P2P networks; P2P MANET;unstructured; search algorithms; Peer-to-Peer; ad-hoc; fooding; random walk; resource discovery; content discovery; mobile peer-to-peer;broadcast; peer

    1 Introduction

    MANETs are dynamic mobile ad-hoc wireless networks that use multi-hop routing.The nodes in such networks are capable of communicating using layer-3 routing in case they are not connected at layer-2 directly.The resource discovery process is very challenging in such networks as there is a continuous movement of nodes.Previously, traditional search techniques like random walk and fooding were extensively employed for the resource discovery process.In fooding, the source node transmits the packet to all the other nodes in the network.Contrary to this, the packet is randomly transmitted to a few nodes in the network in the random walk approach.Although both approaches have some disadvantages, they are used in MANETs as it suits the selforganizing nature of the network.Several previous research works have studied the effectiveness of peer-to-peer (P2P) resource discovery approaches for wired networks.The effectiveness of several content searching techniques is tested for the P2P network.But, due to problems related to energy consumption, mobility, infrastructure defciency, and churn, their performance is not validated against MANETs.

    Noor et al.[1] studied the effectiveness of the random walk approach for MANETs and they have discussed its issues like unicast transmission disadvantage, valid termination check parameter, next-hop selection criteria, etc.P2P networks are very common, and they constitute a majority of internet traffc [2].P2P networks are known for their fexibility and distributive network properties and P2P based systems are employed over the internet for services like video conferencing applications, torrent applications, information retrieval systems, telephony, fle sharing, etc.Based on the architecture design, the P2P networks are categorized into 2 types.One is the structured type, where the peers are strictly well-organized with each peer maintaining a DHT index.Some of the cases that belong to this type are Tapestry, Pastry, Chord, CAN, etc.In this type, since the involved peer positions are structured, the query searches are more effective.But these systems have major shortcomings in a mobile ecosystem mainly due to peer churn.Due to rapid movement, index pointer is required to be altered constantly which increases overhead and complexity.Contrary to this, there are no strict rules for forming topology and placement of the peers in the unstructured type.Further, there is no need for any central indexing and nodes join arbitrarily.Some of the cases that belong to this type are Freenet, Random walk, Kazaa,Fastrack, Gnutella, etc.In a fully distributed P2P system, every peer has an equivalent role in the network.Centralized architecture is used for most mobile communication even today and the bottleneck issue created by them can be overcome by employing the P2P platform [3].This P2P based approach suits wired and wireless networks including MANETs.

    Combining P2P network properties in mobile ad-hoc networks is coined as P2P MANETs or Mobile P2P networks.Due to similarities in P2P and MANETs, a P2P overlay can run over Mobile Ad-hoc Network.An overlay network is formed by communication between the peers wherein each link of overlay corresponds to a path in an underlay physical network.But, at the same time, their direct combination also poses diffculties due to differences in the operating layer,transmission mechanism, and rapid mobility in MANETs.

    In such a distributed environment, resource discovery is a key issue.Unstructured P2P networks mostly rely on fooding and random walk techniques for searching.As a preliminary study, we evaluated the unstructured P2P searching techniques over MANET [4,5].According to our study, the pure random walk approach under MANETs consumes more battery power,increases network overhead, has high search latency, and lowered hit rate when compared to other unstructured protocols.To overcome this, we proposed a resource discovery protocol based on the cross-layered architecture to suit better and work well under P2P-MANETs as shown in Fig.1.It is essential to take the topology of the underlying physical links into consideration when developing an effcient search strategy for such dynamic evolving networks [6–8].For the same,we proposed an alternate technique for discovering the neighbor nodes and extracting the node density information for P2P applications running over MANET as given in Algorithm 1, whose source code is publicly available in SourceForge1https://sourceforge.net/projects/neighbordiscovery/and the complete P2P network resource discovery simulation over mobile ad-hoc network with our proposed neighbor node discovery method is publicly available in GitHub.2https://github.com/ajayarunachalam/Neighbor-Discovery

    Figure 1:Proposed addressed cross-layered architecture

    The rest of this paper is structured as follows.In Section 2, we review the existing work related to analytical based analysis for P2P and MANETs.Section 3 discusses the problem statement of modeling the physical situation.Analysis of fooding-based search procedures and our proposed scheme are introduced in Section 4, and their performance measures are derived.In Section 5, we summarize our results, and fnally, Section 6 concludes the paper.

    2 Related Works

    In this section, we discuss the various relevant works that estimate the performance of resource discovery protocols analytically.Although there are many empirical studies and simulation-based analyses of fooding-based schemes and its variants, the mathematical results are still lacking especially in the context of P2P networks over MANET.Effciently and quickly locating a resource is a major issue in unstructured networks.Techniques such as probabilistic forwarding, random walk, and fooding are extensively used in such unstructured architecture.Barjini et al.[9] analytically review many search techniques that are based on a fooding approach for an unstructured P2P network.They measure the coverage growth rate and traffc loads for each scheme.They introduce a metric, i.e., the critical value which is the ratio of the amount of redundant messages over the coverage growth rate.According to their study and simulation results,the probabilistic limit-based fooding schemes (i.e., teeming, modifed breadth-frst search, random walk, etc.) have better performance than the TTL limit based fooding schemes (such as local indices, expanding ring, iterative deepening, etc.).Bisnik et al.[10] present an analytical expression to measure the performance metrics of random walk protocol in unstructured P2P networks in terms of TTL of walkers, count of walkers, and demand of the resource.Their work focuses on a wired P2P network.Dimakopoulos et al.[11] study the performance of teeming, random path,and fooding search schemes, in P2P systems.Their study considers two scenarios, i.e., resource requests in the presence of popular and unpopular resources.Further, they assume that a cache is used to store the details of the resources and their corresponding resource providers at each node.To overcome the drawbacks observed in fooding and random walk techniques, Lin et al.[12]propose a technique that is the combination of both schemes.Depending on the search context, it performs fooding for a short-term search and follows the random walk technique for a long-term search.They use Newman’s work [13] for the random graph and adopt generating functions to model distribution degrees.An alternative to the fooding scheme is the gossip protocol, where every node transmits the message to a subset of its neighbors in a random fashion based on some probability.In [14], costs of Gnutella’s fooding-based broadcasting and the classic gossip protocol are studied by varying network size and the average number of neighbors.Further, they calculate the bandwidth required for each node in the fooding mechanism.They propose a deterministic gossip-based protocol and compare their performance with the fooding technique.Ferretti [15]proposes a mathematical model for the gossip-based resource discovery protocol in unstructured P2P overlay networks.Their analysis is based on complex network theory.They analyze and evaluate the count of nodes receiving the query and the amount of query hits.Specifc work to model and optimize random walk protocol over MANET is presented in [16].They modeled their method using a queuing system called G-network which has positive and negative kinds of customers.Further, they used the gradient descent method to optimize their method which uses 3 parameters such as consumption of energy, response time, and hit rate as part of the cost function.Most of the aforementioned works are evaluated over a wired and fxed layout like the internet.Further, in the case of analysis and evaluation of P2P content searching techniques under MANET, there is a lack of empirical study that considers the underlay network topology.A game theory-based resource search algorithm is proposed in [17].In their work, a Rock-Paper-Scissors-Game-Based (RPSGB) strategy is deployed for resource discovery to complement mobile P2P networks.We apply the probability and queuing theory concepts to model the unstructured search techniques over MANET.

    3 Problem Specifcation,and Analytical Modeling

    An Overlay GraphOG=(V,E)is used to represent a P2P overlay network, whereVis the count of nodes, andEis the count of links.The vertices and the edges of this graph represent the participating peers and virtual links respectively.Therefore,OGcan be explicitly defned as,OG=(V,E)where |V|=p andlink(i,j)∈Eifiis a neighbour ofj, and vice versa, andpis the count of peers.The underlay structure is formed by ad-hoc and peer nodes.Under MANETs, the P2P platform is implemented as an overlay network at the application layer, formed by communications between the peers wherein each link of the overlay is supported by a path in the underlay physical network.In our analysis, the underlay structure is considered as a connected graphCG=(V,E)where |V|=WNandlink(i,j)∈Eif and only ifDij≤TxwhereWNis the count of wireless nodes, andDijis the Euclidean distance between them.If the Euclidean distance between 2 nodes is less thanTx(transmission range of the node), then it means that they are in the transmission range of each other.Fig.2 depicts the above explanation, where each virtual link of the overlay network is supported by a path in the underlying physical network.

    Algorithm 1:Neighbor discovery with density Procedure neighbor discovery(){create neighbour array if (strcmp(argv[1], “neighbour_list”)==0) then initialize neigbhour_list array point to the frst element in neighbour cache from AODV_Neighbour for each neighbour link to neighbour →next node obtain the address of the neighbour append AODV routing layer neighbour list information to neighbour array pass this information to the P2P application}Procedure node density(){if (strcmp(argv[1], “neighbour_count”)==0) then initialize nbrs=0 point to the frst element in neighbour cache from AODV_Neighbour for each neighbour link to neighbour →next node increment and update nbrs pass this information to the P2P application}

    Figure 2:P2P Overlay running on MANET

    Smart resource discovery is the heart of the P2P system.In ad-hoc networks, routing is expensive, so it requires a more effective resource discovery process.In such resultant networks,resource discovery is the key challenge due to frequent network dynamics.So, how the search query can be resolved quickly and effciently while lowering the message overhead is the aim of our proposed scheme, validated further with analytical modeling.

    We preliminarily assume a random network topology ofNmobile nodes where only one node provides the resourcex, and there is a single nodeSsearching for that resource.Each node knows itsdneighbors.We use the work done in [11] as the basis for our further analysis.Tab.1 contains the summary of the notations used in the model along with their descriptions.

    Table 1:Notations used and derived.

    To limit the broadcast storm, the search is bounded to the maximumtnumber of steps (i.e.,TTL value).Let us assume thatFis the probability of resourcexbeing known to a specifc node.A node can know a resource only when it holds that resource.

    F=1 ?P[the node doesn’t hold x]

    Letnxbe the count of nodes offering the resource “x”.Since a resourcexis offered by only one node, we havenx=1.

    Letabe the probability that a node is not aware of the resource.So,a=1 ?F.LetQtbe the probability of fnding a resource withintsteps.We assume that withintsteps, a resource can be located.Hence, the mean of steps needed to fnd the resourcexis given as,

    The derivation of Eq.(3) is given at the end of the section.In the equation,Qtdepends on the searching strategy.We consider fooding, random walk and our proposed addressed random walk methods which are depicted as a d-ary tree that unfolds as the search progresses, shown in Fig.3.A tree representation may not be perfect for representing such wireless network topology as many nodes may overlap each other’s range and, multiple nodes may communicate with a single node.Yet, the tree representation can visualize the search scenario pictorially.

    The focus of this article is on several decentralized resource discovery schemes.In fooding,when a resource is required by a node, it will communicate with its neighboring nodes and further,those nodes will communicate with their neighbors.This process will be repeated until every node in the network is communicated as shown in Fig.3a.The fooding method can fnd a resource without any hierarchy or prior specifc information about the system, thus an ideal candidate in such dynamically evolving networks.One of the disadvantages of this pure fooding method is that it increases the network traffc exponentially.Therefore, another variation of fooding called random walk is considered.This method restricts the search space by restricting the node to communicate only with one of its neighbors in a random fashion as presented in Fig.3b.The limitation of this method is that it takes more steps to fnd a resource.Both the abovediscussed schemes have their drawbacks and limitations.From our preliminary study [4,5], we observe that the random walk scheme under MANET increases the network overhead, battery power consumption, bandwidth usage, search latency, etc.And, further has a low success ratio.To overcome these issues, we propose a simple and lightweight resource discovery technique to suit well under MANET where the node propagates the inquiring message to exactly one of their neighbors at each hop, but at the same time end up unfolding different virtual paths concurrently,as shown in Fig.3c.So, it will lower the network traffc even without restricting the search space.

    Figure 3:Comparison of different fooding-based search strategies and our proposed scheme.(a) Flooding, (b) random walk (c) addressed random walk

    Derivation of Eq.(3):Letsiis the probability of fnding a resource inith step exactly.The probability of fnding it withint≥1 steps is formulated as:

    This implies thatst=Qt?Qt?1.Under the assumption that withintsteps, the resource is found, the probability of fnding it inith step exactly is given byand the mean of steps is given by:

    Substituting forst, we obtain:

    Letgt=Qtthe recurrence takes the following form:

    gt=gt?1+tQt?tQt?1, with the boundary ofg0=S0Q0=0

    Evaluatinggtwe get,

    Since,gt=follows,

    4 Performance Analysis

    4.1 Flooding Algorithm

    In fooding, a node that requires the resource will food the message to its neighbors which in turn retransmits it to their neighbors.This will continue until the node that is holding the required resource is found or the TTL expires.For better understanding, the nodes in the network are represented as a d-ary tree.To visualize the situation, refer to Fig.4 , where the resource requesting nodeSis the root and nodeDholds the resource being searched.Fig.4a shows a sample network where fooding technique is used while its corresponding rough d-ary tree representation is shown in Fig.4b.Within consecutive search steps, the tree will contact at mostdidifferent nodes in theith level.

    Figure 4:Searching using naive fooding technique (a) searching using broadcast by fooding technique (b) d-ary tree representation

    Letbe the probability to fnd the resourcexwithintsteps for the fooding algorithm.Fis the probability that a resource is known to a node and ‘a(chǎn)’ is the probability that a resource is not known to a node.Hence,a=1 ?F.

    At ‘0’ step, the probability of not locating the resourcexis given as,

    1 ?=Probability of not locating the resource within “1” step

    1 ?=Probability of not locating in 0 step ?Probability of not fnding in Step 1

    Similarly,

    1 ?=Probability of not locating in 0 steps ?Probability of not locating in Step 1 ?

    Probability of not locating in Step 2

    Continuing this way, if we unfold the subsequent inquiring node’s neighbors until thetsteps,then the probability of not locating resourcexis generated as,

    From Eq.(4), it is clear than the initial boundary condition is= 1 ?a=F.The probabilityQt?1occurs only if it fnds the required resource until thet?1 levels of the subtree.

    Therefore,

    Now replace 1 ?asqt, so Eq.(6) becomes,qt=a?(qt?1)d.Solving further we get,

    Now evaluating for different values oft,

    Hence Eq.(7) becomes,

    Next, we determine the average number of steps required to locate the resource.In general,the average steps needed are given as in Eq.(3).Now substituting Eqs.(8) in (3), we get the average number of steps required to fnd the resource withintsteps for the fooding algorithm fort≥1.

    We now compute the average number of messages that will be generated for the fooding technique.In fooding, the messages are fooded through the network.A 1-hop broadcast with the message will be transmitted by the nodeS.Once the message is received by the 1-hop neighbors,the processed messages list will be updated with the newly received message’s sequence ID.This is done to avoid retransmitting the same message again in case if the message is received again through a different path.Now, if the required resource is held by a neighboring nodeD, an exclusive multi-hop reply will be transmitted by nodeDthrough the path resolved by routing protocol to the sourceS.However, even after the transmission of the resource reply message,the request message may be forwarded meaninglessly by all the other nodes that have received the request until every node in the network is reached.So, under MANETs, “d” messages will be generated by “d” neighboring nodes of the root, plus for the internal subtrees of those neighboring nodes.Thus,

    where,m(t?1)denotes the transmission along the subtreeTwith(t?1)levels.In a subtreeT,if the resourcexis located at the root, a response will be sent to the querying node or elsedmessages will be generated by the child nodes plus the generated messages internally for each respective child subtreesTwith(t?2)levels.

    Symbolically it means,

    m(t?1)=F+(d+dm(t?2))?(1 ?F)

    m(t?1)=1 ?a+ad+adm(t?2)

    which has initial boundary condition ofm(0)=1.After evaluating the recurrence, we get,

    Now substituting Eqs.(12) in (11) and evaluating further we have,

    4.2 Random Walk Algorithm

    In the random walk algorithm under MANET, the querying node transmits the message to a specifc neighboring nodenthat is selected in a random fashion from a list of neighbors resolved from the routing layer information over a unicast transmission.For such a random walk scenario,there will beprandomly unfolding paths to reach the destination, i.e., the node sends the request top≥1 of its neighboring nodes and each of those neighboring nodes will unfold a random path of which one possibility is shown in Fig.5.

    Figure 5:Searching using simple random walk technique (a) searching the network using classic random walk protocol (b) d-ary tree representation

    Letbe the probability of fnding a resource withintsteps for the random walk algorithm wherepis one of the randomly unfolding paths of lengtht?1.Fis the probability that a resource is known to a node andais a probability that a resource is not known to a node.Hence,a=1 ?F.At “0”, step the probability of not locatingxis given as,

    1 ?=1 ?F=a

    1 ?= Probability(‘x’ is not occur in ‘t’ step)

    1 ?= Probability(‘x’ is not occur in ‘0’ step) and Probability(‘x’ is not occur in ‘1’ to‘t’ step)

    where(1 ?F)is the probability that a resource is not known to a given node and(1 ?qt?1)is the probability of not fnding the resource in one of the “p” randomly unfolding paths of lengtht?1.

    After further evaluation we get,

    The average number of steps needed in general to locate the resourcexis given in Eq.(3).Now substituting Eqs.(15) in (3) we get the average number of steps needed to fnd a resource withintsteps for the random walk algorithm forp≥1,t≥1.

    which further is evaluated to,

    Finally, we compute the avg.generated messages in the random walk scheme under MANET which is different from that as in the wired network.The unicast transmission uses the routing layer information in a standard random walk algorithm under MANET.But the issue is that the nodes move continuously in MANETs.Therefore, there will be a rapid change of neighbors of all nodes over time.So, such transmission may often lead to failure since the topology of the network changes rapidly.Also, this leads to frequent re-route discovery which increases the message overhead.Hence, the overall message generated will be much more than the normal for each path due to the failure thereby incurring frequent re-route discovery at every hop.In such a dynamic scenario, there will bepmessages generated bydneighbors for everypof its children,plus the messages generated in each of theppaths.

    where,m(t?1)denotes the transmissions that take place along a pathpoft?1 nodes.

    For such a pathp, the reply will be unicasted through the path resolved by the routing protocol if resourcexis located at the root node.Further, the query will be terminated at that moment since the received message also contains the addressSand the process will get terminated or else a message will be generated while forwarding to next node of the path plus the message generated inside the subpathp′witht?2 nodes rooted at the next node.This gives the recurrence relation:

    m(t?1)=1 ?F+(1+m(t?2))?(1 ?F)=am(t?2)+1

    where,m(0)=1.On solving the recurrence relation, we get:

    Now substituting Eqs.(18) in (17) it gives:

    4.3 Addressed Broadcast Random Walk(ABRW)Algorithm

    To reduce the overhead in the classic random walk protocol, we proposed an improved random walk algorithm [7].Our technique is based on the addressed broadcast transmission mechanism in which the querying node will pass the request to a particular random node over a 1-hop addressed broadcast transmission, i.e., the request is forwarded to that node, while the neighboring nodes within the hop range will overhear the request, but only the addressed node will process the request further and continue the resource discovery.So, in short, every neighbor node will receive the message at its application layer, but inside the message, there will be the nodeID for which that message is actually addressed to.The P2P agent at the application layer will process it differently based on the message content.So, the addressed node will only try to forward the message again.For our addressed random walk algorithm also, there will be aprandomly unfolding paths that can be followed to reach the destination.Our scheme is different from the standard random walk protocol as even thedoverhearing neighbors can also see or receive the message, and hence there is a high probability of reaching the destination as the intermediate nodes can also reply if they have the resourcexalong the pathp.And onlypmessages will be generated for itspchildren, as the addressed node will only continue with the resource discovery process further, i.e., the node transmits the message top≥1 of its neighbors where each such neighbor unfolds a sub-tree withdneighbors of lengtht?1 where everydneighbors can also overhear the message.Letbe the probability of locating a resource withintsteps for our proposed scheme wherepis one of the randomly unfolding paths and for every suchpchildren it unfolds a sub-tree of lengtht?1 with theirdneighbors shown in Fig.6.

    LetFbe the probability that a resource is known to a node, andais the probability that a resource is not known to a node.Hence,a=1 ?F.At step “0”, the probability of not locatingxis given as,

    Now,

    1 ?=Probability that ‘x’ is not found in ‘t’ step

    1 ?=(Probability that ‘x’ is not found in ‘0’ step) * (Probability that ‘x’ is not occur in‘1’ to ‘t’ step)

    where, 1 ?Pt?1is the probability of not locating the resource in one ofprandomly unfolding sub-tree of lengtht?1 withdneighbors.

    Now substituting Eqs.(21) in (20) we have,

    Figure 6:Searching using addressed broadcast random walk technique (a) searching the network using addressed broadcast random walk technique (b) d-ary tree representation

    In our proposed random walk technique, the probability of fndingxis high at eachpchildren along the path, as even thedneighbors can respond immediately.Hence, the number of steps required to fnd the resource will be minimal when compared to the other discussed techniques.

    The average number of steps needed to fnd the resource “x”can be found using Eq.(3), now substituting Eqs.(22) in (3) we have,

    which further evaluates to,

    Next, we compute the average number of generated messages for our proposed algorithm.In our resource discovery scenario, the nodes reply directly to the querying node.Ifxis not offered by the addressed node then there will be one fxed message generated while forwarding to every addressed child node and the message generated in each of theppaths.

    where,m(t?1)are the transmission occurring along the pathpoft?1 nodes.

    For such a pathp, if resourcexis found in its addressed node or any of itsdneighbors of the broadcasting node then it will generate a reply to the querying node which is unicasted back using the path resolved by the routing protocol, and the query gets terminated only if the reply was from the addressed node or else a message will be generated while forwarding to next addressed node of the path plus the message generated inside the subpathp′witht?2 nodes rooted at the next node.This gives the recurrence relation:

    m(t?1)=1 ?F+(1+m(t?2))?(1 ?F)=am(t?2)+1

    where,m(0)=1, since the last node receiving the message will always reply to the querying node whether it knowsxor not.On solving the recurrence relation, we get:

    Now substituting Eqs.(25) in (24) it gives:

    5 Theoretical Analysis

    We compare the three search strategies analytically with the following settings.The network consists ofN=100 nodes, andnx=1 (as only one node holds the resource “x”).We consider for two different node degrees, i.e., sparse (d=4) and dense (d=6) scenarios.We evaluate withp=1 andp=4 paths for both the random walk protocol and our proposed method.We measure the probability of not fnding the resource within “t” steps (1 ?Qt), the average number of steps requiredand the number of messages generated within “t” stepsfor each of the algorithms.The results are shown in Fig.7.

    Figure 7:Comparisons of different search techniques using the metrics:Probability of not fnding the resource, average number of steps needed to locate the resource, and average number of messages generated during the search process

    The mathematical results are summarized in Tab.2.for each of the search techniques.

    Table 2:Search algo.evaluation performance metrics (t ≥1,p ≥1,Q0=1 ?a)

    6 Conclusion

    In this work, the focus is on the general issues of resource discovery under a highly dynamic mobile P2P network.Specifcally, the performance of random walk and fooding techniques related to this problem are studied.Flooding tries to locate the resource in an aggressive manner by visiting almost all the nodes and it has a scalability issue as it leads to the generation of an enormous quantity of queries.Even though random walk searches conservatively, but under MANETs, it also generates huge message overhead at each hop, and further, it takes longer search time.To overcome the above issues, we introduce a cross-layered addressed random walk scheme for MANETs which is a hybrid of random walk and fooding method that is designed considering the physical network aimed to suit such a highly evolving network.The contribution of the article is two-fold.(1) Theoretical modeling of the search algorithms, and deriving analytical measures evaluating their performances.(2) Mathematical modeling of the proposed resource discovery protocol to optimize random walk algorithm over MANETs.Such, evaluation in context to P2P MANETs is not done before.This paper focuses on improving the performance of the random walk method by lowering the message overhead, and increasing the query hit rate while lowering the query delay.We present an analytical model to estimate the performance of each studied search strategy based on the metrics including the probability of fnding a resource, the mean of steps needed to fnd a resource, and the mean of messages generated while fnding a resource.The derived parameters are one of the most important performance metrics in MANET.As future work, we decide to validate the theoretical results through simulation experiments.We further also plan to model our game theory-based resource discovery algorithm.

    Acknowledgement:We are thankful to all the collaborating partners in the presented study.

    Funding Statement:Taif University Researchers Supporting Project Number (TURSP-2020/36),Taif University, Taif, Saudi Arabia.

    Conficts of Interest:The authors declare that they have no conficts of interest to report regarding the presented study.

    午夜视频精品福利| 欧美又色又爽又黄视频| 欧美日韩亚洲国产一区二区在线观看| 欧美黑人巨大hd| www.www免费av| 18美女黄网站色大片免费观看| 黄色视频不卡| 啦啦啦免费观看视频1| 又紧又爽又黄一区二区| 曰老女人黄片| 日本三级黄在线观看| 国产欧美日韩一区二区精品| 国产一区二区三区在线臀色熟女| 91成人精品电影| 一级a爱视频在线免费观看| 亚洲在线自拍视频| 国产亚洲欧美98| 俄罗斯特黄特色一大片| 男女午夜视频在线观看| av免费在线观看网站| 人人澡人人妻人| 三级毛片av免费| 久久久久久久精品吃奶| 波多野结衣高清作品| 午夜福利18| 亚洲三区欧美一区| 99精品在免费线老司机午夜| 在线av久久热| 丝袜人妻中文字幕| 久久精品91无色码中文字幕| 俄罗斯特黄特色一大片| 国产精品,欧美在线| 丰满的人妻完整版| 国产欧美日韩一区二区三| 国产视频一区二区在线看| 怎么达到女性高潮| 成人手机av| 亚洲五月婷婷丁香| 国产av又大| 色综合站精品国产| 午夜福利一区二区在线看| 久久人人精品亚洲av| 波多野结衣高清无吗| 国产精品99久久99久久久不卡| 中亚洲国语对白在线视频| 国产黄a三级三级三级人| 男女下面进入的视频免费午夜 | 欧美绝顶高潮抽搐喷水| 国产av一区在线观看免费| 老司机午夜十八禁免费视频| а√天堂www在线а√下载| 久久天堂一区二区三区四区| 成人三级黄色视频| 亚洲精品一区av在线观看| 一级黄色大片毛片| 亚洲第一欧美日韩一区二区三区| 亚洲国产欧美一区二区综合| 这个男人来自地球电影免费观看| 身体一侧抽搐| 久久 成人 亚洲| 国产亚洲欧美98| 亚洲精品久久国产高清桃花| 亚洲狠狠婷婷综合久久图片| 日韩欧美三级三区| 日韩精品青青久久久久久| 成人av一区二区三区在线看| 中文字幕精品免费在线观看视频| 国产激情久久老熟女| 1024手机看黄色片| 成人免费观看视频高清| 日韩欧美一区视频在线观看| 成人国产一区最新在线观看| 又黄又粗又硬又大视频| 我的亚洲天堂| 亚洲第一欧美日韩一区二区三区| 好男人在线观看高清免费视频 | 亚洲欧洲精品一区二区精品久久久| 欧美色视频一区免费| 最近最新中文字幕大全免费视频| 亚洲精品粉嫩美女一区| 午夜影院日韩av| 日韩精品青青久久久久久| 自线自在国产av| 免费在线观看影片大全网站| 欧美一级a爱片免费观看看 | 久久精品国产亚洲av高清一级| 亚洲欧美一区二区三区黑人| 久久久久久久精品吃奶| 久久久水蜜桃国产精品网| 国产一区在线观看成人免费| 香蕉久久夜色| 成人18禁在线播放| 99热这里只有精品一区 | 精品高清国产在线一区| www国产在线视频色| 久久香蕉激情| 人成视频在线观看免费观看| 中亚洲国语对白在线视频| 久久性视频一级片| 一个人观看的视频www高清免费观看 | 国产成人精品久久二区二区免费| 日本在线视频免费播放| 国产精品一区二区免费欧美| 真人一进一出gif抽搐免费| videosex国产| 99热只有精品国产| 一进一出好大好爽视频| 99精品欧美一区二区三区四区| 村上凉子中文字幕在线| 99久久久亚洲精品蜜臀av| 久久久久久免费高清国产稀缺| 亚洲精品一卡2卡三卡4卡5卡| 欧美性长视频在线观看| 国产精品亚洲美女久久久| 精品一区二区三区av网在线观看| 欧美久久黑人一区二区| 欧美一级毛片孕妇| av福利片在线| 一本久久中文字幕| 亚洲一码二码三码区别大吗| 国产精品爽爽va在线观看网站 | 午夜福利免费观看在线| 岛国视频午夜一区免费看| 日韩欧美一区视频在线观看| 美女大奶头视频| 丝袜在线中文字幕| 亚洲三区欧美一区| 777久久人妻少妇嫩草av网站| 国产精品国产高清国产av| 50天的宝宝边吃奶边哭怎么回事| 午夜久久久久精精品| 91大片在线观看| 国产在线精品亚洲第一网站| 午夜老司机福利片| 欧美日韩一级在线毛片| 国产成人影院久久av| 99精品久久久久人妻精品| 欧美中文日本在线观看视频| 高清在线国产一区| 欧美日韩亚洲国产一区二区在线观看| 国产成人啪精品午夜网站| 国产aⅴ精品一区二区三区波| 国产精品电影一区二区三区| 日日爽夜夜爽网站| 一本精品99久久精品77| 欧美黄色淫秽网站| 国产97色在线日韩免费| 人妻久久中文字幕网| 亚洲欧美精品综合久久99| 成人18禁高潮啪啪吃奶动态图| 日韩欧美国产在线观看| 人妻丰满熟妇av一区二区三区| 国产精品电影一区二区三区| 精品久久久久久久人妻蜜臀av| 美国免费a级毛片| 亚洲三区欧美一区| 亚洲 国产 在线| 女人高潮潮喷娇喘18禁视频| 12—13女人毛片做爰片一| 麻豆成人av在线观看| 久久婷婷成人综合色麻豆| 丝袜在线中文字幕| 色精品久久人妻99蜜桃| 国产精品爽爽va在线观看网站 | 狠狠狠狠99中文字幕| 夜夜爽天天搞| 一区二区三区精品91| 国产熟女午夜一区二区三区| 欧美日韩一级在线毛片| 久久久精品国产亚洲av高清涩受| 成人三级做爰电影| 亚洲精品国产一区二区精华液| 国产精品亚洲av一区麻豆| 国产精品美女特级片免费视频播放器 | 嫁个100分男人电影在线观看| 日韩高清综合在线| 在线观看免费日韩欧美大片| 男人的好看免费观看在线视频 | 夜夜爽天天搞| 99国产综合亚洲精品| 国产精品日韩av在线免费观看| 亚洲精品国产精品久久久不卡| 亚洲男人天堂网一区| 亚洲国产欧洲综合997久久, | 老司机午夜福利在线观看视频| www国产在线视频色| 亚洲国产精品久久男人天堂| 精品久久久久久成人av| 国产人伦9x9x在线观看| 亚洲 欧美一区二区三区| 色老头精品视频在线观看| 久久久国产欧美日韩av| 99久久99久久久精品蜜桃| 久久久久精品国产欧美久久久| 久久人妻av系列| 国产激情偷乱视频一区二区| 精品高清国产在线一区| 女性被躁到高潮视频| 久久久久久人人人人人| 国产男靠女视频免费网站| 日韩欧美一区视频在线观看| 啦啦啦免费观看视频1| 美女午夜性视频免费| 99国产极品粉嫩在线观看| 午夜福利欧美成人| av欧美777| 色综合站精品国产| 一区二区三区精品91| 国产麻豆成人av免费视频| av片东京热男人的天堂| 91大片在线观看| 窝窝影院91人妻| 欧美绝顶高潮抽搐喷水| 精品福利观看| 亚洲成人精品中文字幕电影| 一二三四社区在线视频社区8| 免费看美女性在线毛片视频| 久久久水蜜桃国产精品网| 国产成年人精品一区二区| 国产一区二区激情短视频| 久久久久久久精品吃奶| 一进一出抽搐动态| 一边摸一边抽搐一进一小说| a级毛片在线看网站| 午夜福利视频1000在线观看| 欧美日韩一级在线毛片| 精品欧美一区二区三区在线| 国产aⅴ精品一区二区三区波| 91老司机精品| 色播在线永久视频| 美国免费a级毛片| 在线十欧美十亚洲十日本专区| 女性被躁到高潮视频| 欧美不卡视频在线免费观看 | 欧美成人免费av一区二区三区| 女人被狂操c到高潮| 亚洲第一欧美日韩一区二区三区| 色综合欧美亚洲国产小说| 亚洲国产中文字幕在线视频| 欧美国产日韩亚洲一区| 国产成人av激情在线播放| 亚洲av片天天在线观看| 国产伦在线观看视频一区| 免费在线观看视频国产中文字幕亚洲| 亚洲精品一卡2卡三卡4卡5卡| 亚洲国产高清在线一区二区三 | 一区二区日韩欧美中文字幕| 中文字幕人妻丝袜一区二区| 久久香蕉国产精品| 欧美激情高清一区二区三区| 国产精品 国内视频| 91国产中文字幕| 国产日本99.免费观看| 人妻久久中文字幕网| 日本一本二区三区精品| 国产又黄又爽又无遮挡在线| 免费在线观看视频国产中文字幕亚洲| 中文亚洲av片在线观看爽| 在线观看www视频免费| 精品国产超薄肉色丝袜足j| 国产三级在线视频| 啦啦啦 在线观看视频| 一区二区三区精品91| 亚洲国产中文字幕在线视频| 九色国产91popny在线| 成人精品一区二区免费| 精品国产超薄肉色丝袜足j| 国产又色又爽无遮挡免费看| 中文字幕另类日韩欧美亚洲嫩草| 亚洲人成电影免费在线| 熟女少妇亚洲综合色aaa.| 50天的宝宝边吃奶边哭怎么回事| 搡老熟女国产l中国老女人| 国产一区二区三区视频了| 无遮挡黄片免费观看| 久久久国产精品麻豆| 欧美日韩福利视频一区二区| 法律面前人人平等表现在哪些方面| 免费观看精品视频网站| 欧美绝顶高潮抽搐喷水| 999久久久精品免费观看国产| 人人妻,人人澡人人爽秒播| 国产真人三级小视频在线观看| 久久精品国产亚洲av香蕉五月| www.999成人在线观看| 日本a在线网址| e午夜精品久久久久久久| 精品高清国产在线一区| 久久国产精品影院| 亚洲精品在线美女| 国产av在哪里看| 久久天堂一区二区三区四区| 夜夜爽天天搞| 最新在线观看一区二区三区| 午夜久久久久精精品| 好看av亚洲va欧美ⅴa在| 中文亚洲av片在线观看爽| 人人妻人人澡欧美一区二区| 黑丝袜美女国产一区| 精品免费久久久久久久清纯| 在线看三级毛片| 九色国产91popny在线| 白带黄色成豆腐渣| 伊人久久大香线蕉亚洲五| 婷婷六月久久综合丁香| 一个人免费在线观看的高清视频| 1024视频免费在线观看| 欧美色欧美亚洲另类二区| 成人18禁在线播放| 亚洲国产欧美网| 亚洲国产高清在线一区二区三 | 91字幕亚洲| 久热这里只有精品99| 叶爱在线成人免费视频播放| 两性夫妻黄色片| www国产在线视频色| 怎么达到女性高潮| 欧美不卡视频在线免费观看 | 国产精品免费视频内射| 欧美+亚洲+日韩+国产| 18禁国产床啪视频网站| 丝袜人妻中文字幕| 久久国产精品人妻蜜桃| 99久久99久久久精品蜜桃| 美女国产高潮福利片在线看| 伊人久久大香线蕉亚洲五| 亚洲男人天堂网一区| 久久九九热精品免费| 久久久久久久久免费视频了| 一区二区三区激情视频| av欧美777| a级毛片a级免费在线| 两性夫妻黄色片| 午夜免费鲁丝| 亚洲成人久久性| 老汉色av国产亚洲站长工具| 欧美成人一区二区免费高清观看 | 91大片在线观看| 一级毛片高清免费大全| 国语自产精品视频在线第100页| av免费在线观看网站| 国产精品久久久久久亚洲av鲁大| 国产成年人精品一区二区| 免费看十八禁软件| √禁漫天堂资源中文www| 啦啦啦韩国在线观看视频| 成人一区二区视频在线观看| 黄色 视频免费看| 无遮挡黄片免费观看| 露出奶头的视频| 操出白浆在线播放| 50天的宝宝边吃奶边哭怎么回事| 99精品在免费线老司机午夜| 国产亚洲精品久久久久久毛片| 1024香蕉在线观看| 黄片大片在线免费观看| 精品国产乱子伦一区二区三区| 亚洲午夜理论影院| 国产成人欧美| 男人舔女人下体高潮全视频| 香蕉丝袜av| 桃色一区二区三区在线观看| 亚洲国产日韩欧美精品在线观看 | 免费无遮挡裸体视频| 每晚都被弄得嗷嗷叫到高潮| 国产精品免费一区二区三区在线| 18美女黄网站色大片免费观看| www国产在线视频色| 久久久久久久久中文| 黄色 视频免费看| 波多野结衣高清作品| a级毛片在线看网站| 午夜久久久在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 很黄的视频免费| 麻豆一二三区av精品| 少妇粗大呻吟视频| 长腿黑丝高跟| 欧美色视频一区免费| 窝窝影院91人妻| 欧美一区二区精品小视频在线| 亚洲精品美女久久av网站| 好男人在线观看高清免费视频 | 草草在线视频免费看| 亚洲国产精品成人综合色| 校园春色视频在线观看| 欧美日本视频| 午夜免费成人在线视频| 欧美性猛交黑人性爽| 国产麻豆成人av免费视频| 黄色毛片三级朝国网站| 亚洲全国av大片| 91成年电影在线观看| 少妇的丰满在线观看| 国产亚洲av高清不卡| 一a级毛片在线观看| 亚洲一码二码三码区别大吗| 色综合欧美亚洲国产小说| 亚洲成人免费电影在线观看| 久久欧美精品欧美久久欧美| 亚洲男人天堂网一区| 国产精华一区二区三区| svipshipincom国产片| 少妇 在线观看| 国产高清激情床上av| 亚洲av熟女| 久久精品国产99精品国产亚洲性色| 一级毛片高清免费大全| 午夜福利高清视频| 黄色视频,在线免费观看| 精品久久久久久成人av| 国产精品亚洲一级av第二区| 美女国产高潮福利片在线看| 日本免费一区二区三区高清不卡| 久久久久久久久久黄片| 别揉我奶头~嗯~啊~动态视频| 亚洲一区二区三区不卡视频| 一区二区日韩欧美中文字幕| 一区二区三区精品91| 黄色a级毛片大全视频| 成人特级黄色片久久久久久久| 一进一出好大好爽视频| 这个男人来自地球电影免费观看| 亚洲第一电影网av| 日韩中文字幕欧美一区二区| 日韩三级视频一区二区三区| 精品熟女少妇八av免费久了| 亚洲午夜理论影院| 天天躁狠狠躁夜夜躁狠狠躁| 狠狠狠狠99中文字幕| 在线播放国产精品三级| 女同久久另类99精品国产91| 亚洲av美国av| 可以免费在线观看a视频的电影网站| 国产精品永久免费网站| 侵犯人妻中文字幕一二三四区| 美女高潮喷水抽搐中文字幕| 国产精品美女特级片免费视频播放器 | 日本在线视频免费播放| 日韩免费av在线播放| 免费看美女性在线毛片视频| 女人被狂操c到高潮| 成人国产综合亚洲| 久久婷婷人人爽人人干人人爱| 一区二区三区精品91| 欧美最黄视频在线播放免费| 午夜视频精品福利| 亚洲狠狠婷婷综合久久图片| 久久精品国产99精品国产亚洲性色| 国产乱人伦免费视频| 黄片小视频在线播放| 麻豆成人午夜福利视频| 韩国av一区二区三区四区| 亚洲第一av免费看| 中亚洲国语对白在线视频| 国产在线精品亚洲第一网站| 激情在线观看视频在线高清| 国产男靠女视频免费网站| 日韩视频一区二区在线观看| 一级片免费观看大全| 黄色a级毛片大全视频| 波多野结衣高清无吗| 久久亚洲真实| 精品国内亚洲2022精品成人| 韩国精品一区二区三区| 国产精品 国内视频| 午夜日韩欧美国产| 在线观看一区二区三区| 日韩大码丰满熟妇| 日日爽夜夜爽网站| 人人妻人人澡欧美一区二区| 18美女黄网站色大片免费观看| 国产亚洲精品av在线| 黄片小视频在线播放| 亚洲欧美精品综合久久99| 欧美亚洲日本最大视频资源| 色综合站精品国产| 99热这里只有精品一区 | 国产主播在线观看一区二区| 1024手机看黄色片| 韩国av一区二区三区四区| 国产主播在线观看一区二区| 麻豆国产av国片精品| 国产亚洲精品综合一区在线观看 | www.自偷自拍.com| 亚洲精华国产精华精| 丁香六月欧美| 草草在线视频免费看| 欧美日韩福利视频一区二区| www日本在线高清视频| 日韩欧美三级三区| 日本撒尿小便嘘嘘汇集6| 国产乱人伦免费视频| 亚洲精品粉嫩美女一区| 可以免费在线观看a视频的电影网站| 在线观看66精品国产| 叶爱在线成人免费视频播放| 观看免费一级毛片| 午夜a级毛片| 在线观看日韩欧美| 超碰成人久久| 免费电影在线观看免费观看| 精品熟女少妇八av免费久了| 国产精品免费视频内射| 美女高潮到喷水免费观看| 欧美另类亚洲清纯唯美| 欧美+亚洲+日韩+国产| 人成视频在线观看免费观看| 久久久久精品国产欧美久久久| 老熟妇仑乱视频hdxx| 国产精品久久久久久人妻精品电影| 麻豆一二三区av精品| 久久精品国产亚洲av香蕉五月| 黄色片一级片一级黄色片| 亚洲电影在线观看av| 69av精品久久久久久| 一本综合久久免费| 长腿黑丝高跟| 特大巨黑吊av在线直播 | 久久久久久久久久黄片| 成年女人毛片免费观看观看9| 精品少妇一区二区三区视频日本电影| 亚洲精品美女久久av网站| 成人亚洲精品av一区二区| 久久欧美精品欧美久久欧美| 中亚洲国语对白在线视频| 亚洲中文日韩欧美视频| 国产精品久久久人人做人人爽| 久久久精品国产亚洲av高清涩受| 黄色成人免费大全| 欧美日韩中文字幕国产精品一区二区三区| www.精华液| 此物有八面人人有两片| 午夜福利在线观看吧| 国产熟女xx| 波多野结衣高清作品| 欧美另类亚洲清纯唯美| 亚洲国产精品sss在线观看| av超薄肉色丝袜交足视频| 黑人操中国人逼视频| 99精品欧美一区二区三区四区| 亚洲精品国产一区二区精华液| 欧美亚洲日本最大视频资源| 欧美黑人巨大hd| 人人澡人人妻人| 久久人人精品亚洲av| 国产亚洲av嫩草精品影院| 国产伦在线观看视频一区| 亚洲男人天堂网一区| www.精华液| 搡老岳熟女国产| 夜夜夜夜夜久久久久| 此物有八面人人有两片| 1024手机看黄色片| 在线观看舔阴道视频| 精品国产美女av久久久久小说| 成年免费大片在线观看| 国产高清视频在线播放一区| 夜夜爽天天搞| 无限看片的www在线观看| 免费高清在线观看日韩| 啦啦啦韩国在线观看视频| 免费电影在线观看免费观看| 色av中文字幕| 亚洲精品在线观看二区| 1024视频免费在线观看| 国产亚洲精品一区二区www| 男女做爰动态图高潮gif福利片| 99久久精品国产亚洲精品| 每晚都被弄得嗷嗷叫到高潮| 丝袜人妻中文字幕| 亚洲精品一卡2卡三卡4卡5卡| 亚洲av熟女| 少妇熟女aⅴ在线视频| 听说在线观看完整版免费高清| 中文字幕久久专区| 亚洲,欧美精品.| 国产av一区在线观看免费| av在线播放免费不卡| 欧美色欧美亚洲另类二区| 一区二区三区激情视频| 18禁美女被吸乳视频| 日韩国内少妇激情av| 叶爱在线成人免费视频播放| 中文资源天堂在线| 国产精品自产拍在线观看55亚洲| 成人精品一区二区免费| 在线天堂中文资源库| 亚洲在线自拍视频| 国产一卡二卡三卡精品| 欧美中文综合在线视频| 国产又爽黄色视频| 免费看日本二区| 国产三级在线视频| 两人在一起打扑克的视频| 18禁观看日本| 午夜精品在线福利| 欧美日韩黄片免| a级毛片在线看网站| 超碰成人久久| 国产黄色小视频在线观看| 国产伦一二天堂av在线观看| 亚洲人成77777在线视频| 免费一级毛片在线播放高清视频| 久久精品影院6| 九色国产91popny在线| 亚洲第一青青草原| 国产aⅴ精品一区二区三区波| 国产91精品成人一区二区三区| 久久伊人香网站| 国产免费av片在线观看野外av| 久久精品国产99精品国产亚洲性色| 97碰自拍视频| 黄色片一级片一级黄色片| 国产三级在线视频|