Bandwidth Trading in Unstructured P2P Content Distribution Networks
|
|
- Arline Gray
- 6 years ago
- Views:
Transcription
1 Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, Abstract Bandwidth trading schemes give peers an incentive to provide upload bandwidth to other peers in a P2P network for fast file distribution. A popular example is the tit-fortat strategy used in the BitTorrent protocol. Although this game theoretical scheme provides an incentive to peers to contribute resources to the network it does not prevent unfairness and the performances of peers vary considerably. Therefore, we propose two new trading schemes, which are based on pricing. One uses explicit price information whereas the other scheme uses the download rates from other peers as the price. For both distributed algorithms the stable point provides a fair resource allocation as well as a Nash Equilibrium. I.e. fairness is preserved although peers behave selfishly and try to maximise their own download rates only. We compare both pricing schemes with BitTorrent in simulations of static and dynamic networks. The pricing algorithms outperform BitTorrent with respect to fairness. With explicit prices the download rates converge faster to the fair equilibrium than with implicit ones. Introduction The Peer-to-Peer (P2P) paradigm offers obvious advantages for the fast distribution of large content in the Internet. While in the client/server architecture the total load must be carried by the server(s), it is distributed across the users in a P2P network. But the cooperation of peers is not a matter of course. P2P faces the problem of free-riding [] where peers consume resources solely without contributing anything to the network. Therefore, reputation systems and/or incentive mechanisms are implemented in P2P applications frequently. A very interesting approach is the so-called swarming principle. Here, the file of interest is fragmented into blocks. When a peer completes the download of a single block, it offers it to other peers that so far have not downloaded this block. Thus, peers exchange blocks with each other although they did not finish the download of the complete file. Therefore, the resources in the P2P network are used more efficiently and the network depends not solely on the altruistic or cooperative behaviour of the peers. The swarming principle rather exploits the two-way interest of peers in different blocks, which the other one provides. Since most of the peers behave selfishly and are interested in maximising their own download rates, the mutual interest results in peers, which bargain for bandwidth with each other. Hence, the swarming principle supports also content distribution in a non-cooperative environment. A very popular example is the BitTorrent protocol [3] where a peer uploads to others from which it receives the highest download rates. This strategy is inspired by the tit-for-tat principle that is well known from game theory. Here, a player adopts the strategy, which his opponent used in the previous round. By cooperating in the first step the tit-fortat strategy proved very effective in the repeated prisoner s dilemma []. Unfortunately, simulation-based studies for BitTorrent reveal a high variability in the download rates [7] and unfairness in terms of the ratio of uploaded to downloaded data [2]. This means that some peers are better off by using the tit-for-tat strategy than the others. These results raise two questions. Firstly, from the user perspective: Does another strategy exist which outperforms BitTorrent s tit-for-tat strategy? This means with such kind of strategy a user can increase its download performance. Since the total capacity in the network is finite this happens at the expense of others. Secondly, from the angle of a protocol designer: Does a strategy exist which ensures fairness between peers although peers behave selfishly? This work tries to answer the second question. Thereby, we compare BitTorrent s titfor-tat mechanism with two bandwidth trading schemes. In both trading schemes we assume that a peer knows its upload capacity and can freely distribute this upload capacity over its connections to other peers. In the first proposed trading scheme each peer receives a (virtual) payment for
2 uploading data to others. These payments control the sending rates in the future. Peers with higher price offers will receive higher rates whereas the rate will decrease for peers with lower price offers. Furthermore, the total payments a peer can afford is limited to its own upload capacity. We will show that such an algorithm converges to a fair distribution of the available upload bandwidth in the network weighted by the upload bandwidth of a peer. In the second trading scheme peers use their download rates from other peers as the payment information. Thus, no explicit pricing must be implemented in the protocol. It should be noted that a trading scheme is only one of the building blocks of a P2P protocol. Since every peer starts with no block at the beginning a good implementation has to ensure that new peers have a decent chance to finish their first block fast. Therefore, altruistic behaviour of some peers is essential or further incentive mechanisms are needed in the network (e.g. based on the reputation of peers). Furthermore, the selection of blocks to download is important for the future exchange with other peers. The BitTorrent protocol implements a rarest-first strategy where each peer determines the rarest block of its neighbours and requests this block if available. Different papers show the efficiency of this model analytically [] or by simulation [2]. Additionally, new coding schemes resolve the block selection problem [5]. By exchanging linear combinations of all the blocks a peer stores, the probability that two peers have nothing of interest for the other one is reduced significantly. We concentrate in this work on the discussion and the detailed comparison of different trading schemes. The paper is structured as follows. Section 2 discusses the trading schemes and the Nash Equilibria of them. In Section 3 the setup of the simulation is described. The results of the simulations are presented and discussed in Section 4. Section 5 concludes the paper. 2 Trading Schemes We study bandwidth trading schemes which provide an incentive to contribute to the P2P content distribution network. Each peer tries to maximise its own download rate by appropriately allocating its upload bandwidth to other peers. The first scheme is a game theoretical approach and is used in the BitTorrent protocol. The other two schemes are based on pricing models. Thereby, both pricing algorithms use rate control at the application layer. In an real implementation this can be realised by the application putting different amounts of data into the socket buffers of the TCP connections. A more sophisticated approach is to schedule the traffic directly at the queue of the network interface card, e.g. with Linux Traffic Control [6]. 2. BitTorrent s Tit-for-Tat In BitTorrent each peer controls to whom it uploads data. This is called unchoking. A peer uploads to a fixed number of other peers (the default value is four). Thereby, a peer chooses the upload candidates from which it has the highest download rates. This tit-for-tat strategy is run every ten seconds by every peer, whereby the download rates are determined by a moving average over the last 2 seconds. To discover new peers with better performance a so-called optimistic unchoke is done additionally. Here, a peer is unchoked independently of its rate. The optimistic unchoke is changed every 3 seconds to provide enough time to be possibly unchoked by the remote peer in return. When a peer has completed the download of the file, unchoking is based on its upload rates to the connected peers. This unchoking algorithm gives peers an incentive to upload data to the network since it increases the chance to be unchoked by others with increasing upload capacity. Details about the BitTorrent protocol can be found in [3]. 2.2 Resource Pricing We proposed in [4] a distributed algorithm for a fair resource allocation. This algorithm can be applied to P2P content distribution networks whereas the upload bandwidth is the scarce resource. In our model each peer pays a virtual price for using upload bandwidth at a remote peer. The sum of all prices a peer can afford to pay is bounded by its willingness-to-pay. For P2P file-sharing this willingnessto-pay is the upload bandwidth of a peer. This model gives an incentive to contribute to the network since a peer with a high upload capacity can offer higher prices than others and therefore receives a higher download rate. The distributed algorithm is explained in the following. Assume each peer allocates an upload capacity to the P2P application which is denoted as at peer p. Furthermore, peer p can upload to a number of peers which are interested in a block which peer p offers. This set of peers is denoted as the service customers SC(p) of p. Each interested peer offers a price λ c per unit of upload bandwidth. Based on these prices peer p sets the upload rate x pc to the remote peer c. Furthermore, the price offer of an interested peer is proportional to its upload capacity. Hence, the resource pricing algorithm is the set of differential equations RESOURCE PRICING (RP) : ( d dt x pc(t) =γx pc (t) λ c (t) x ) pd(t)λ d (t) λ c (t) = () C c p SP(c) x pc(t), (2)
3 where SP(c) denotes the set of peers in which peer c is interested in. Thus, the denominator of (2) is the total download rate of peer c. (Furthermore, two exceptional cases have to be considered in a real implementation. When the total download rate of a peer is zero, we set λ c (t) =C c. And secondly, when λ c (t) > but x pc (t) = we set x pc (t +)=ɛ where ɛ is a small positive constant.) () can be interpreted as follows. Since λ c is the price per unit of bandwidth, the product x pc λ c is the total price which is payed by peer c. According to this the sum in the numerator of () represents the total revenue of peer p. Multiplying the total revenue by xpc specifies the average revenue peer p generates by allocating the rate x pc. If the total price of peer c is higher than the average price (i.e. the left term in the bracket of () is greater than the right one), then peer p increases its upload rate to c and decreases it otherwise. Further on, when we assume that two peers receive different download rates although they provide the same upload capacity to the network we see from (2) that the peer with the smaller download rate will offer a higher price per unit in the future than the other one. Hence, its download rate will increase. The equilibrium of the system (-2) can be determined by setting () to zero. Thus, the total download rate for a peer c in equilibrium is [4] y c = p SP(c) x pc = C c p P d SC C d, (3) where SC is the set of peers which currently download the file and P is the set of all peers in the network, i.e. also including the seeds, peers which stay altruistically in the network after completion of their download. It can be seen from (3) that the download rates of the peers are proportional to their upload capacity and the bandwidth allocation is fair weighted by the contribution of each peer. When no peer behaves altruistically (3) reduces to y c = C c. 2.3 Reciprocal Rate Control The resource pricing algorithm in Section 2.2 assumes the correct signalling of the price offers. Thus, an implementation must ensure that malicious users cannot forge their price offers to obtain higher download rates. When this is not possible in a specific application, an upload rate control algorithm can only be based on the download rates of the connected peers (like in BitTorrent). In the context of pricing mechanisms the download rates can be interpreted as the price a remote peer is willing to pay for the upload bandwidth allocated to it. In the resource pricing algorithm the total price paid by the remote peer is the product x pc λ c. Hence, by replacing x pc λ c with the rate x cp in () we obtain a reciprocal rate control algorithm using an implicit pricing signal RECIPROCAL RATE CONTROL (RRC) : ( d dt x pc(t) =γ x cp (t) x pc (t) x ) dp(t) In the following we prove that the proposed algorithm fully utilises the upload capacity under the assumption that in the previous step all resources are used. Therefore, we sum up over all upload rates of peer p x pc (t +) (5) = (4) ( ( x pc (t)+γ x cp (t) x pc (t) x )) dp(t) (6) = x pc (t)+γ x cp (t) x pc (t) x dp(t) = + γ (7) x cp (t) C x dp(t) p (8) = (9) This means when we start with an initial rate allocation which is efficient (e.g. by splitting the upload capacity evenly over all connections) all following rate allocations are efficient as well. Furthermore, we prove that the stable point of the distributed algorithm is efficient by setting (4) to zero = γ (x cp x x ) dp pc () x pc = x x cp () dp x pc = (2) The upload rates in equilibrium can be computed with () and (2) x cp = x x dp pc (3) x cp = x pc (4) In equilibrium a peer uses its full upload bandwidth (cp. (2)) and downloads from a specific peer with the same rate as it is uploading (cp. (4)). Thus, with (2) and (4) the total download rate over all connections is equal to the upload capacity of the peer.
4 The RRC algorithm is restricted to peers that did not complete the download already. It ensures that a peer receives at least the rate, which it provides to the network. Seeds cannot run the RRC algorithm and have to use other rules for their upload. (E.g. these peers can upload to peers, which have nothing at all.) Therefore, an advantage of explicit prices used in Section 2.2 compared to implicit prices is that fairness is preserved also over the altruistically contributed resources in the network. 2.4 Nash Equilibrium Most peers in a P2P network behave selfishly and try to maximise their performance only. Therefore, we can interpret the trading of bandwidth as a non-cooperative game and study the Nash equilibrium. In a Nash equilibrium no peer gains by only changing its strategy while all other players keep their strategy unchanged. This means a Nash equilibrium corresponds to a set of strategies where every player has found the best response to the actions of the other players []. [] studies the Nash equilibrium for the BitTorrent protocol. Thereby, each peer can choose its upload bandwidth between and its physical upload capacity. Since a higher upload bandwidth is associated with a higher cost, a peer is interested primarily in maximising its download rate while also minimising its cost at the same time. [] shows that a Nash equilibrium exists for networks consisting of groups (with a group size larger than the number of unchokes plus one) of peers where peers belonging to the same group have identical upload bandwidths. In this situation the best case for a peer is to upload to other peers in its group. The threshold to be unchoked is exactly the upload bandwidth divided by the number of unchokes (which is assumed to be equal for all peers). Therefore, a peer will be choked by the peers of its group when it reduces its upload bandwidth. This results in inferior performance. On the other hand a Nash equilibrium does not exist when peers have different upload capacities as it is demonstrated by an example in []. In the following we study the Nash equilibria for the two proposed pricing schemes in steady-state. Assume for Resource Pricing that a peer cannot forge its price offer λ. It can be seen directly from (3) that any reduction of upload capacity will result in a decrease of the download rate. When maximising the download rate has priority over minimising the upload cost every peer will upload with its physical upload capacity. Thus, the steady-state of the system (-2) is a Nash equilibrium. Similarly, the existence of the Nash equilibrium for Reciprocal Rate Control can be shown for the steady-state with (4). Since a peer receives exactly the rate, which it provides to the other peer, it gains nothing by reducing its upload bandwidth. 3 Simulation Setup Because of the computational complexity of the simulations at packet-level we restrict our analysis to the application layer. Therefore, the TCP behaviour is omitted. We assume a user sets the maximal upload bandwidth of his P2P application between zero and his physical upload capacity. Furthermore, we assume this is the bottleneck in the network. Since the utilisation in the core of the network is low [9] and access lines are often asymmetric favouring the downlink we believe this is a reasonable assumption. The bandwidth trading schemes depend highly on the number of neighbours and especially on the number of connections where both sides are interested in data blocks of the other side. Thus, the schemes depend on the topology generated by the protocol and the implemented block selection algorithm. To concentrate on the trading schemes in the simulations we omit the block selection algorithm and assume connected peers are always interested in blocks of each other. The overlay topology is constructed in our simulations according the original BitTorrent implementation [3]. Here, a peer asks a so-called tracker, a centralised component that stores information about all peers, for a list of other peers in the network. The tracker returns a random subset of length to the requesting peer. Hence, a peer opens a new connection to a remote peer based on the list returned by the tracker or when a remote peer asks for it. In our simulations we consider static and dynamic P2P networks. In the static case all N P peers are registered at the tracker. Then each peer obtains a peer list from the tracker. If we assume that all peers accept every incoming connection request, a peer p iterates through its peer list and opens connections. Furthermore, one more connection is established when a remote peer which is unknown to p, i.e. not on the peer list of p, contacts it. The probability that x peers contact p is B(x) and follows the binomial distribution ( ) NP B(x) = P x ( P ) NP x, (5) x where P is the probability that peer p is on the peer list of a peer q under the assumption that q is not on the list of p. The probability that a specific peer id is returned by the tracker is based on the hypergeometric distribution and is (N P ) 2 N ( R NP ) = N N P, (6) R when we assume a tracker does not return the id of the requesting peer. Thus, we can compute P with P = N ( R N P N P ). (7)
5 The expectation value E[N C ] of the number of connections N C of a peer is the sum of and the expectation value E[X] of the random variable X which is distributed according (5). Therefore, E[N C ]= + E[X] (8) ( = +(N P ) N ) R (9) N P N P ( = + N ) R (2) N P 2 (2) The approximation in (2) holds if N P. For the simulations with dynamics we model the peer behaviour as a Poisson process, where the interarrival times between peers and the session times of peers are exponentially distributed. The expectation value of the number of peers in the network is E[N P ]= λ µ which depends on the mean arrival rate λ and the mean service rate µ. We assume the tracker returns valid information of online peers only. Since the Poisson process is memoryless a peer which is asked to open a new connection by a remote peer has a remaining session time distributed with mean µ. Therefore, the rate of closing connections for a peer is µ. On the other hand new peers will open a connection to peer p. The probability that peer p is chosen by a new peer is given by (6) and can be estimated with E[N P ]. New peers enter with the rate of λ. Therefore, the rate of opening new N connections is λ R E[N P ]. Hence, the expectation value of the number of connections is λ E[N C ] = (E[N P ] ) µ (22) λ N λ R (23) µ µ = (24) The results of the expected number of connections in the static and the dynamic network in (2) and (24), respectively, are different and deviate by a factor of 2. This has to be taken into account for the simulations where fairness is studied for different values of. 4 Simulation Results 4. Static networks One major difference of the two pricing schemes to Bit- Torrent s tit-for-tat strategy is their convergence to a steadystate. To demonstrate the basic functionality of all algorithms we run a simulation for a small network of peers with homogeneous upload capacities of C =. The superposition of the download rates of the peers is depicted in Figure. Whereas the download rates of the peers oscillate between.4 and.6 for BitTorrent, the rates converge fast to a fair allocation for the Resource Pricing and the Reciprocal Rate Control algorithm where each peer receives exactly its upload capacity. Especially the performance of BitTorrent depends on the number of neighbours. To study the influence of the topology on the download performance simulations are run with varying parameter. The network population was peers, each peer starting with a small random offset to avoid synchronisation effects. The simulation consisted of iterations of the respective algorithm and was repeated 5 times. We set γ =. for RP and RRC and ɛ =.C/N C. The empirical cumulative distribution function (CDF) of the mean download rate over the iterations is depicted over all runs in Figure 2. To compare the three algorithms Figure 2 shows the results for download rates between 5 and.5. With BitTorrent s tit-for-tat algorithm peers receive highly different download rates while providing the same upload capacity. To see its performance in detail Figure 3 shows the CDF for download rates of.5 to 2. Tit-fortat depends on the number of neighbours. With =2a peer has on average four connections only and therefore no choice in selecting peers. This results in a poor performance where % of the peers receive half of what they provide. Download rates are distributed more equitably with increasing.for =all peers receive a mean download rate of ±2% of their upload capacity, whereas this percentage decreases to ±% for =5. Nonetheless, the distribution of download rates with BitTorrent is not as uniformly distributed as with the two proposed pricing algorithms. Nearly all peers receive download rates between 8 and.2 with both algorithms and values of > 2. Furthermore, the download rates at the end of each simulation were equal to one for every peer. This means the pricing algorithms converged. Thus, the differences of the CDFs for different values of in Figure 2(b) and 2(c) are due to differences in the rate of convergence. Because of the slight differences observed in the results we analyse the convergence properties for the case of heterogeneous peers. For the next simulation we consider heterogeneous peers with upload capacities of integers between and. The capacity is determined randomly at the start of the simulation. With a total of peers there are on average peers with the same capacity in the network. The download performance of each peer is measured by the ratio of mean download rate to upload capacity. The CDF of the download performances is depicted for BitTorrent in Figure 4. As expected the download performances of the peers vary more as compared to the simulation results with homogeneous peers. In all four curves some peers receive more
6 Download Rate Download Rate Download Rate Round Round Round (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure. Superposition of the download rates of peers for different trading schemes =.3.2. =.3.2. = (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure 2. for varying parameter =.2. = / Upload Capacity Upload Capacity Figure 3. CDF for BitTorrent Figure 4. CDF for BitTorrent with heterogeneous peers Figure 5. Superposition of mean download rates for Bit- Torrent ( =)
7 5 =5 5 5 Weighted Fairness Index =5 = Weighted Fairness Index =5 = N =5 R N =2 R Weighted Fairness Index N =5 R = =5 N =2 R = Iteration Iteration Iteration (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure 6. Weighted Fairness Index in heterogeneous network than the double compared to what they provide. On the other hand the performance with =5isgood: Only around % of the peers receive a download to upload ratio of less than. This proportion rises to about 5% for =and 3% for =5. The curves of the CDFs for =and =5in Figure 4 rise very slowly for values greater than.5. This suggests that a small fraction of peers have a better performance compared to all others. By looking at Figure 5 we can identify these peers. It can be seen that for Bit- Torrent peers with a upload capacity of C =receive a mean download rate larger than one whereas the peers with C =receive mostly a rate lower than their contribution. One reason for this is the optimistic unchoke since a low capacity peer gains more than it invests compared to a high capacity peer. Another reason is the incapability to find the right match which also explains the different performances between peers with the same capacity. Because of space limitations we omitted the CDFs for the two pricing schemes. They outperform BitTorrent with respect to fairness. The ratio of the mean download rate to the upload capacity is over 8 for all peers for > 2. Only for =2fairness deteriorates and around 2% of the peers have a ratio of less than 5. Since the performances of the pricing algorithms depend on the convergence we measured a variant [4] of Jain s Fairness Index [8] extended to weighted fairness over the simulation time. The results in Figure 6 show for > 2 the convergence to a fair resource allocation for both proposed algorithms in less than 7 iterations. The convergence is better with increasing and better for Resource Pricing than with Reciprocal Rate Control. When =2we observed no convergence even for higher number of iterations. In this case some peers receive an unfair download rate because its small neighbourhood cannot raise the adequate rate with their upload capacity. The weighted fairness index of BitTorrent is below for all studied values of. (It should be noted that a fairness index of corresponds for example to an allocation where % of the peers receive nothing at all and the remaining 9% receive equal rates.) 4.2 Dynamic networks We conducted simulations also for dynamic networks where interarrival times between peers and session times of peers are negative exponentially distributed. We set = and compare the performance for two cases with the same average peer population of. We assume the respective algorithm is run per unit time. The resulting CDFs are depicted in Figure 7(a) and Figure 7(b). Compared to the static case the fairness deteriorates for dynamic networks. Nevertheless, with an arrival process of peers with a rate /λ =, i.e. on average iterations of the algorithm before a new peer enters, the two pricing schemes achieve nearly uniformly distributed download performances for heterogeneous peers. For /λ =infigure 7(b) the CDF shows higher variability in the achieved download performance for the two proposed algorithms. Thereby, the results for Reciprocal Rate Control deteriorate more than for Resource Pricing comparing it with the results in Figure 7(a). Especially for /λ =, /µ = some peers stay only a very short time in the network and merely run the trading algorithm a few times. This results in poor download performance as it can be seen from Figure 7(c). Here, the minima of the download performances of peers with similar session times are measured for time intervals of 25 time units. For all schemes the minimal download performance increases with the session times of the peers. But the increase is more pronounced for the two trading schemes. After around 5 time units the minimal download performance in the net-
8 BitTorrent Resource Pricing Reciprocal Rate Control / Upload Capacity BitTorrent Resource Pricing Reciprocal Rate Control / Upload Capacity MIN( / Upload Capacity )..7.5 BitTorrent Resource Pricing Reciprocal Rate Control Peer Session Time (a) CDF for /λ =, /µ = (b) CDF for /λ =, /µ = (c) Minimal download performance (/λ =, /µ = ) Figure 7. Results for dynamic networks work is above. This indicates that the two distributed algorithms show improved fairness between peers also in varying networks compared to BitTorrent. It should also be noted that the update interval of the pricing algorithms can be adapted to the dynamics of the network as long as the download rates can be estimated accurately. 5 Conclusion BitTorrent s tit-for-tat strategy gives peers an incentive to contribute upload bandwidth to the network. But it cannot avoid unfairness between peers with respect to the experienced download performance. Especially when peers have a small number of connections download rates vary considerably. Furthermore, peers with small upload capacities compared to others receive considerably more than what they contribute to the network. This paper presents two alternatives to improve fairness. Both use price information to control the upload rates at the application layer. We derive that the proposed distributed algorithms achieve in equilibrium a fair and efficient allocation of the total upload bandwidth contributed by the peers in the network. Furthermore, the steady-states of the two schemes provide Nash equilibria. In simulations both algorithms show good convergence and better fairness as the tit-for-tat strategy used in BitTorrent. Each of the two proposed algorithms has its advantages. Reciprocal Rate Control is robust against malicious users since it uses the download rates from other peers as the price information. These cannot be forged. On the other hand Resource Pricing, which uses explicit prices, preserves fairness also for the allocation of the altruistically contributed resources offered by the peers that completed their download already. Additionally, it shows slightly better convergence than Reciprocal Rate Control in the simulations. References [] E. Adar and B. A. Huberman. Free riding on Gnutella. First Monday, 5(), Oct. 2. [2] A. R. Bharambe, C. Herley, and V. N. Padmanabhan. Analyzing and improving BitTorrent performance. Technical Report MSR-TR-25-3, Microsoft Research, 25. [3] B. Cohen. Incentives build robustness in BitTorrent. In Proc. st Workshop on Economics of Peer-to-Peer Systems, Berkeley, June 23. [4] K. Eger and U. Killat. Fair resource allocation in Peer-to- Peer networks. In Proc. 26 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 6), Calgary, Canada, July 26. [5] C. Gkantsidis and P. Rodriguez. Network coding for large scale content distribution. In Proc. IEEE INFOCOM, Miami, March 25. [6] B. Hubert, T. Graf, G. Maxwell, R. van Mook, M. van Oosterhout, P. Schroeder, J. Spaans, and P. Larroy. Linux Advanced Routing & Traffic Control HOWTO. Documentation from [7] M. Izal, G. Urvoy-Keller, E. W. Biersack, P. Felber, A. A. Hamra, and L. Garcés-Erice. Dissecting BitTorrent: Five months in a torrent s lifetime. In Passive and Active Mesurements, pages, April 24. [8] R. Jain. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, 99. [9] A. Odlyzko. Data networks are lightly utilized, and will stay that way. Review of Network Economics, 2(3):2 237, September 23. [] M. J. Osborne. An Introduction to Game Theory. Oxford University Press, 24. [] R. Qiu, D. Srikant. Modeling and performance analysis of BitTorrent-like peer-to-peer networks. Computer Communication Review, 34(4): , 24.
TCPeer: Rate Control in P2P over IP Networks
TCPeer: Rate Control in P2P over IP Networks Kolja Eger and Ulrich Killat Institute of Communication Networks Hamburg University of Technology (TUHH) 21071 Hamburg, Germany {eger, killat}@tu-harburg.de
More informationScalability of the BitTorrent P2P Application
Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationPerformance Analysis and Improvement for BitTorrent-like File Sharing Systems
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2007; 00:1 7 [Version: 2002/09/19 v2.02] Performance Analysis and Improvement for BitTorrent-like File Sharing
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationBitTorrent Fairness Analysis
BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)
More informationImpact of Inner Parameters and Overlay Structure on the Performance of BitTorrent
Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationThe Design Trade-offs of BitTorrent-like File Sharing Protocols
The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationP2P Content Distribution
, University of Hannover Wolf-Tilo Balke and Wolf Siberski 28.11.2007 *With slides from K. Wehrle (RWTH), A. Bharambe (CMU), P. Rodriguez, P. Chou (MSRC), Chiu (CUHK) Peer-to-Peer Systems and Applications,
More informationDesign Space Analysis for Modeling Incentives in Distributed Systems
Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed
More informationDelft University of Technology Parallel and Distributed Systems Report Series. Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds
Delft University of Technology Parallel and Distributed Systems Report Series Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds Lucia D Acunto, Tamás Vinkó, Henk Sips ldacunto@tudelftnl
More informationDissecting BitTorrent: Five Months in a Torrent s Lifetime
Dissecting BitTorrent: Five Months in a Torrent s Lifetime M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garcés-Erice Institut Eurecom, 2229, route des Crêtes, 694 Sophia-Antipolis,
More informationModeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks
Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction
More informationTHE PEER-TO-PEER (P2P) paradigm has proved to be
140 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 2, SECOND QUARTER 2010 A Survey of BitTorrent Performance Raymond Lei Xia and Jogesh K. Muppala, Senior Member, IEEE Abstract Since its inception,
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationPerformance Analysis of BitTorrent Protocol
Performance Analysis of BitTorrent Protocol Parul Sharma Department of Computer Science Engineering sharma.parul111@gmail.com Anuja Bhakuni Department of Computer Science Engineering anuja.bhakuni13@gmail.com
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationCongestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem
Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases
More informationCache Capacity Allocation to Overlay Swarms
Cache Capacity Allocation to Overlay Swarms Ioanna Papafili 1, George D. Stamoulis 1, Frank Lehrieder 2, Benjamin Kleine 2, Simon Oechsner 2, 1 Athens University of Economics and Business, Athens, Greece
More informationPerformance Improvements of Peer-to-Peer File Sharing
0 Performance Improvements of Peer-to-Peer File Sharing Dongyu Qiu Concordia University Canada 1. Introduction In recent years, Peer-to-Peer (P2P) applications, in which peers serve as both clients and
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationARTICLE IN PRESS. Journal of Network and Computer Applications
Journal of Network and Computer Applications 32 (29) 666 683 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Principles
More informationAnalyzing and Improving a BitTorrent Network s Performance Mechanisms
Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In
More informationImproving BitTorrent: A Simple Approach
Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown
More informationModeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks
Modeling, Analysis and Improvement for BitTorrent-Like File Sharing etworks Ye Tian, Di Wu, and Kam Wing g Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin,.T.,
More informationA Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis
A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationThe Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design Bin Fan Dept. of Computer Science Eng. The Chinese University of Hong Kong Email: bfan@cse.cuhk.edu.hk Dah-Ming Chiu Dept. of Information
More informationFairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University
FairTorrent: Bringing Fairness to Peer-to-Peer s Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University Technical Report CUCS-29-8 May, 28 {asherman, nieh, cliff}@cs.columbia.edu
More informationA game-theoretic framework for ISPs interactions in the context of Economic Traffic Management
Euro-NF International Workshop on Traffic and Congestion Control for the Future Internet Volos, Greece, April 1 st, 2011 A game-theoretic framework for ISPs interactions in the context of Economic Traffic
More informationStochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems
Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important
More informationApplication Layer: P2P File Distribution
Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP
More informationUnderstanding and Deconstructing BitTorrent Performance
Understanding and Deconstructing BitTorrent Performance Ashwin R. Bharambe Carnegie Mellon University Cormac Herley Venkata N. Padmanabhan Microsoft Research January 25 Technical Report MSR-TR-25-3 Microsoft
More informationinria , version 1-6 Sep 2006
Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationDynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Oberseminar TU München, Germany December 2007 Networks Neuron Networks DISTRIBUTED
More informationRECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,
More informationImproving the Download Time of BitTorrent-like Systems
Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract
More informationPeer-to-Peer Applications Reading: 9.4
Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,
More informationOver-contribution in discretionary databases
Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationImproving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All
Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All ABSTRACT Ben Leong, Youming Wang, Su Wen, Cristina Carbunaru, Yong Meng Teo National University of Singapore 13 Computing Drive
More informationDesign Space Analysis for Modeling Incentives in Distributed Systems
Design Space Analysis for Modeling Incentives in Distributed Systems Rameez Rahman Delft University of Technology Delft, The Netherlands rrameez@gmail.com Johan Pouwelse Delft University of Technology
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationPEER-TO-PEER (P2P)applications have shown their popularity
954 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement Minglu Li, Jiadi Yu,
More informationBitTorrent for Really Selfish Peers T4T Trading over Cycles
Semester Thesis BitTorrent for Really Selfish Peers T4T Trading over Cycles Roger Odermatt oroger@student.ethz.ch Professor: Dr. Roger Wattenhofer Advisor: Raphael Eidenbenz Department of Information Technology
More informationPerformance Analysis of Peer-to-Peer Networks for File Distribution
Performance Analysis of Peer-to-Peer Networks for File Distribution Ernst W. Biersack, Pablo Rodriguez, and Pascal Felber Institut EURECOM, France {erbi,felber}@eurecom.fr Microsoft Research, UK pablo@microsoft.com
More informationEECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.
EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication
More informationA Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh
A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box
More informationCooperative End-to-end content distribution. Márk Jelasity
Cooperative End-to-end content distribution Márk Jelasity Content distribution So far we looked at search Content distribution is about allowing clients (peers) to actually get a file or other data after
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More informationGame Theory. Presented by Hakim Weatherspoon
Game Theory Presented by Hakim Weatherspoon Game Theory Main Question: Can we cheat (and get away with it)? BitTorrent P2P file distribution tool designed with incentives for contribution Users contribute
More informationEnergy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing
Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Jukka K. Nurminen, Janne Nöyränen Nokia Research Center {jukka.k.nurminen, janne.noyranen}@nokia.com Abstract Battery consumption
More informationOn Feasibility of P2P Traffic Control through Network Performance Manipulation
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida
More informationFurther extensions to the Wigan architecture are discussed in this thesis, including possible means of handling data updates.
COMPUTING SCIENCE A BitTorrent-based Peer-to-Peer Database Server J. Colquhoun TECHNICAL REPORT SERIES No. CS-TR-1135 January, 2009 TECHNICAL REPORT SERIES No. CS-TR-1135 January, 2009 A BitTorrent-based
More informationCover sheet for Assignment 3
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach
More informationThe Importance of History in a Media Delivery System
The Importance of History in a Media Delivery System Richard J. Dunn, Steven D. Gribble, Henry M. Levy, John Zahorjan University of Washington E-mail: {rdunn,gribble,levy,zahorjan}@cs.washington.edu Abstract
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationOn Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks
On Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks Saurabh Tewari, Leonard Kleinrock Computer Science Department, University of California at Los Angeles, 4403
More informationBittorrent traffic classification
Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-
More informationDoctoral Written Exam in Networking, Fall 2008
Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December
More informationCOOPERATION-AWARE TOPOLOGY CONTROL
COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc
More informationJoe Wingbermuehle, (A paper written under the guidance of Prof. Raj Jain)
1 of 11 5/4/2011 4:49 PM Joe Wingbermuehle, wingbej@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The Auto-Pipe system allows one to evaluate various resource mappings and topologies
More informationCountering Hidden-Action Attacks on Networked Systems
Countering on Networked Systems University of Cambridge Workshop on the Economics of Information Security, 2005 Outline Motivation 1 Motivation 2 3 4 Motivation Asymmetric information inspires a class
More informationNew Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization
International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 1 (Jan. 2015) New Technique to Improve BitTorrent Performance Based on Application Layer Traffic
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationarxiv:cs.ni/ v1 21 Nov 2006
Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout Nikitas Liogkas Eddie Kohler Lixia Zhang I.N.R.I.A. University of California, Los Angeles Sophia Antipolis, France Los Angeles, CA,
More informationPublic Review for Design Choices for Content Distribution in P2P Networks. Anwar Al Hamra and Pascal Felber
Public Review for Design Choices for Content Distribution in P2P Networks Anwar Al Hamra and Pascal Felber Peer-to-peer file distribution accounts for a tremendous amount of bandwidth consumption on today's
More informationManagement and Analysis of Multi Class Traffic in Single and Multi-Band Systems
Wireless Personal Communication manuscript No. DOI 1.17/s11277-15-2391-5 Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems Husnu S. Narman Md. Shohrab Hossain Mohammed Atiquzzaman
More informationOPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES
OPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES Elvira Antal Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering and Automation, E-mail: antal.elvira@gamf.kefo.hu Abstract
More informationNet Neutrality and Inflation of Traffic
Introduction Net Neutrality and Inflation of Traffic Martin Peitz (MaCCI, University of Mannheim and CERRE) Florian Schuett (TILEC, CentER, Tilburg University) Symposium in Honor of Jean Tirole The Hague,
More informationSALSA: Super-Peer Assisted Live Streaming Architecture
SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationRobustness of BitTorrent-like VoD Protocols
Acta Cybernetica 22 (26) 673 685. Robustness of BitTorrent-like VoD Protocols Tamás Vinkó Abstract Besides server supported solutions for Video-on-demand, approaches based on distributed systems such as
More informationP2P VoD Systems: Modelling and Performance
P2P VoD Systems: Modelling and Performance Samuli Aalto, Aalto University, Finland Pasi Lassila, Aalto University, Finland Niklas Raatikainen, HIIT, Finland Petri Savolainen, HIIT, Finland Sasu Tarkoma,
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationChanging the Unchoking Policy for an Enhnaced BitTorrent
1/1 Changing the Unchoking Policy for an Enhnaced BitTorrent Vaggelis Atlidakis, Mema Roussopoulos and Alex Delis Department of Informatics and Telecommunications, University of Athens, 15748, Greece April
More informationImproving Performance of BitTorrent Network through Incentive Mechanism
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Summer 2011 Improving Performance of BitTorrent Network through Incentive Mechanism Mingzhe Li San Jose
More informationOn Randomness in ISP-friendly P2P Applications
2012 26th IEEE International Conference on Advanced Information Networking and Applications On Randomness in ISP-friendly P2P Applications S M Saif Shams Simula Research Lab University of Oslo Oslo, Norway
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationBiToS: Enhancing BitTorrent for Supporting Streaming Applications
BiToS: Enhancing BitTorrent for Supporting Streaming Applications Aggelos Vlavianos, Marios Iliofotou and Michalis Faloutsos Department of Computer Science and Engineering University of California Riverside
More informationA Search Theoretical Approach to P2P Networks: Analysis of Learning
A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.
More informationOn the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation
On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of
More informationIntroduction to Distributed Computing Systems
Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed
More informationCongestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica
Congestion Control Brighten Godfrey CS 538 January 31 2018 Based in part on slides by Ion Stoica Announcements A starting point: the sliding window protocol TCP flow control Make sure receiving end can
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationP2P Streaming: a Study on the Use of Advertisements as Incentives
P2P Streaming: a Study on the Use of Advertisements as Incentives Bo-Chun Wang, Alix L.H. Chow, Leana Golubchik Department of Computer Science, University of Southern California Nokia Research Center,
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationServing Niche Video-on-Demand Content in a Managed P2P Environment
1 Serving Niche Video-on-Demand Content in a Managed P2P Environment Eli Brosh 1, Chitra Agastya 2, John Morales 2, Vishal Misra 1, Dan Rubenstein 1 affaddr Department of Computer Science, Columbia University
More informationMarkov Model Based Congestion Control for TCP
Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme
More informationFairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 5, OCTOBER 2012 1361 FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems Alex Sherman, Jason Nieh, and Clifford
More informationIEEE Proof Print Version
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Random Access Game and Medium Access Control Design Lijun Chen, Member, IEEE, Steven H. Low, Fellow, IEEE, and John C. Doyle Abstract Motivated partially by a control-theoretic
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationBitTorrent Optimization Techniques. (from various online sources)
BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More information