8 CONCLUSIONS
In this paper we have outlined our simulation ap-
proach based on stochastic graph transformation. We
used it to model and simulate some aspects of P2P
VoIP network protocols, and we have performed our
experiments with the GraSS/VIATRA tool (Torrini
et al., 2010). We have compared three client promo-
tion to exteded role protocols. The dynamic proto-
col does not seem to be performing better as com-
pared to the need based and static protocols in terms
of happy peers, especially when the number of clients
in the network increases over 400. The results fur-
ther confirmed that increased in super peer does not
mean that network may also result in good number of
happy clients. We further observed that need based
protocol is most suited when there are greater number
of clients, as super peer promotion costs in terms of
bandwidth use.
As future work, we are planning to extend the
model and include spatial information regarding no-
tions of jitter, packet loss and echo, along the lines
of (Khan et al., 2009), and to compare a number of
different design solutions to problems such as rout-
ing, load balancing, selfish exit, and cooperative exit
from the network, in order to investigate their trade-
offs and benefits.
ACKNOWLEDGEMENTS
This research is supported by Universityof Malakand,
Pakistan through faculty development programme of
HEC, Govt. of Pakistan.
REFERENCES
Adami, D., Callegari, C., Giordano, S., Pagano, M., and
Pepe, T. (2009). A real-time algorithm for skype traf-
fic detection and classification. In Lecture Notes in
Computer Science.
Baset, S. A. and Schulzrine, H. G. (2006). An analysis of
the skype peer-to-peer internet telephony protocol. In
25th INFOCOM’06.
Bergmann, G.,
˝
Okr˝os, A., R´ath, I., and Varr´o, G. (2008).
Incremental pattern matching in the VIATRA model
transformation system. In GraMoT’08.
Biondi, P. and Desclaux, F. (2006). Silver needle in the
skype. Technical report, EADS Corporate Research
Centre, Suresnes, France.
Dabek, F. (2001). Building peer-to-peer systems with
chord, a distributed lookup service. In Proceedings
of the Eighth Workshop on Hot Topics in Operating
Systems. 8th HotOS, IEEE Computer Society.
Guha, S., Daswani, N., and Jain, R. (2006). An experimen-
tal study of the skype peer-to-peer voip system. In 5th
IPTPS06.
Gupta, R. and Somani, A. K. (2004). Pricing strategy for
incentivizing selfish nodes to share resources in peer-
to-peer (p2p) networks. In 12th (ICON04).
Heckel, R. (2005). Stochastic analysis of graph transfor-
mation systems: A case study in p2p networks. In
ICTAC05. Springer-Verlag.
Heckel, R., Lajios, G., and Menge, S. (2006). Stochastic
graph transformation systems. Fundamenta Informat-
icae.
Idrees, F. and Khan, U. A. (2008). A generic technique
for voice over internet protocol (voip) traffic detec-
tion. International Journal of Computer Science and
Network Security.
Ji, L. C. (2004). Computation in peer-to-peer networks.
Technical report, Department of Computer Science,
University of Saskatchewan, Canada.
Khan, A., Heckel, R., Torrini, P., and Rth, I. (2010). Model-
based stochastic simulation of p2p voip using graph
transformation system. In 17th Int. Conf. Analyti-
cal and Stochastic Modeling Techniques and Applica-
tions, ASMTA (2010).
Khan, A., Torrini, P., and Heckel, R. (2009). Model-
based simulation of voip network reconfigura-
tion using graph transformation system. In
Vol.17,(ICGT)EASST.
Lara, J. D. (2007). Attributed graph transformation with
node type inheritance. Theor. Comput. Sci. In Funda-
mental Aspects of Software Engineering.
L’Ecuyer, P. L., Meliani, L., and Vaucher, J. (2002). SSJ:a
framework for stochastic simulation in Java. In Winter
Simulation Conference.
Lo, V., Zhou, D., Liu, Y., Dickey, C. G., and Li, J. (2005).
Scalable super node selection in peer-to-peer overlay
networks. In 2nd HOT-P2P Workshop.
Lysne, O., Montaana, J., Pinkston, T., Duato, J., Skeie, T.,
and Flich, J. (2005). Simple deadlock-free dynamic
network reconfiguration. In Boug, L. and Prasanna,
V., editors, High Performance Computing - HiPC
2004, volume 3296 of Lecture Notes in Computer Sci-
ence, pages 277–316. Springer Berlin / Heidelberg.
Milojicic, D. S. (2002). Peer-to-peer computing. Technical
report, HP Labs, Palo Alto.
Montresor, A. (2004). A robust protocol for building super
peer overlay topologies. Technical report, University
of Bologna, Italy.
NS2 (2008). The Network Simulator-NS2,
http://www.isi.edu/nsnam/ns/.
Oneil, H., Jeong, J. K., and Kwon, D. (2000). Transport
layer identification of p2p super node. In hhhhhhhh.
Ren, S., Guo, L., and Zhang, X. (2006). Asap: an as-aware
peer-relay protocol for high quality voip. In 26th Int.
Conf. on Distributed Computing Systems (ICDCS’06),
Lisbon, Portugal.
Rowstron, A. and Druschel, P. (Nov. 2001). Pastry:scalable,
decentralized object location and routing for large-
scale peer-to-peer systems. In 8th Int. Conf. on Dis-
tributed Systems Platforms. Heidelberg, Germany.
MODEL-BASED STOCHASTIC SIMULATION OF SUPER PEER PROMOTION IN P2P VOIP USING GRAPH
TRANSFORMATION
41