1,589 research outputs found
Improving BitTorrent's Peer Selection For Multimedia Content On-Demand Delivery
The great efficiency achieved by the BitTorrent protocol for the distribution
of large amounts of data inspired its adoption to provide multimedia content
on-demand delivery over the Internet. As it is not designed for this purpose,
some adjustments have been proposed in order to meet the related QoS
requirements like low startup delay and smooth playback continuity.
Accordingly, this paper introduces a BitTorrent-like proposal named as
Quota-Based Peer Selection (QBPS). This proposal is mainly based on the
adaptation of the original peer-selection policy of the BitTorrent protocol.
Its validation is achieved by means of simulations and competitive analysis.
The final results show that QBPS outperforms other recent proposals of the
literature. For instance, it achieves a throughput optimization of up to 48.0%
in low-provision capacity scenarios where users are very interactive.Comment: International Journal of Computer Networks & Communications(IJCNC)
Vol.7, No.6, November 201
Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics
Despite its existing incentives for leecher cooperation, BitTorrent file
sharing fundamentally relies on the presence of seeder peers. Seeder peers
essentially operate outside the BitTorrent incentives, with two caveats: slow
downlinks lead to increased numbers of "temporary" seeders (who left their
console, but will terminate their seeder role when they return), and the
copyright liability boon that file segmentation offers for permanent seeders.
Using a simple epidemic model for a two-segment BitTorrent swarm, we focus on
the BitTorrent rule to disseminate the (locally) rarest segments first. With
our model, we show that the rarest-segment first rule minimizes transition time
to seeder (complete file acquisition) and equalizes the segment populations in
steady-state. We discuss how alternative dissemination rules may {\em
beneficially increase} file acquisition times causing leechers to remain in the
system longer (particularly as temporary seeders). The result is that leechers
are further enticed to cooperate. This eliminates the threat of extinction of
rare segments which is prevented by the needed presence of permanent seeders.
Our model allows us to study the corresponding trade-offs between performance
improvement, load on permanent seeders, and content availability, which we
leave for future work. Finally, interpreting the two-segment model as one
involving a rare segment and a "lumped" segment representing the rest, we study
a model that jointly considers control of rare segments and different uplinks
causing "choking," where high-uplink peers will not engage in certain
transactions with low-uplink peers.Comment: 18 pages, 6 figures, A shorter version of this paper that did not
include the N-segment lumped model was presented in May 2011 at IEEE ICC,
Kyot
A New Stable Peer-to-Peer Protocol with Non-persistent Peers
Recent studies have suggested that the stability of peer-to-peer networks may
rely on persistent peers, who dwell on the network after they obtain the entire
file. In the absence of such peers, one piece becomes extremely rare in the
network, which leads to instability. Technological developments, however, are
poised to reduce the incidence of persistent peers, giving rise to a need for a
protocol that guarantees stability with non-persistent peers. We propose a
novel peer-to-peer protocol, the group suppression protocol, to ensure the
stability of peer-to-peer networks under the scenario that all the peers adopt
non-persistent behavior. Using a suitable Lyapunov potential function, the
group suppression protocol is proven to be stable when the file is broken into
two pieces, and detailed experiments demonstrate the stability of the protocol
for arbitrary number of pieces. We define and simulate a decentralized version
of this protocol for practical applications. Straightforward incorporation of
the group suppression protocol into BitTorrent while retaining most of
BitTorrent's core mechanisms is also presented. Subsequent simulations show
that under certain assumptions, BitTorrent with the official protocol cannot
escape from the missing piece syndrome, but BitTorrent with group suppression
does.Comment: There are only a couple of minor changes in this version. Simulation
tool is specified this time. Some repetitive figures are remove
Mesmerizer: A Effective Tool for a Complete Peer-to-Peer Software Development Life-cycle
In this paper we present what are, in our experience, the best
practices in Peer-To-Peer(P2P) application development and
how we combined them in a middleware platform called Mesmerizer. We explain how simulation is an integral part of
the development process and not just an assessment tool.
We then present our component-based event-driven framework for P2P application development, which can be used
to execute multiple instances of the same application in a
strictly controlled manner over an emulated network layer
for simulation/testing, or a single application in a concurrent
environment for deployment purpose. We highlight modeling aspects that are of critical importance for designing and
testing P2P applications, e.g. the emulation of Network Address Translation and bandwidth dynamics. We show how
our simulator scales when emulating low-level bandwidth
characteristics of thousands of concurrent peers while preserving a good degree of accuracy compared to a packet-level
simulator
Analyzing Peer Selection Policies for BitTorrent Multimedia On-Demand Streaming Systems in Internet
The adaptation of the BitTorrent protocol to multimedia on-demand streaming
systems essentially lies on the modification of its two core algorithms, namely
the piece and the peer selection policies, respectively. Much more attention
has though been given to the piece selection policy. Within this context, this
article proposes three novel peer selection policies for the design of
BitTorrent-like protocols targeted at that type of systems: Select Balanced
Neighbour Policy (SBNP), Select Regular Neighbour Policy (SRNP), and Select
Optimistic Neighbour Policy (SONP). These proposals are validated through a
competitive analysis based on simulations which encompass a variety of
multimedia scenarios, defined in function of important characterization
parameters such as content type, content size, and client interactivity
profile. Service time, number of clients served and efficiency retrieving
coefficient are the performance metrics assessed in the analysis. The final
results mainly show that the novel proposals constitute scalable solutions that
may be considered for real project designs. Lastly, future work is included in
the conclusion of this paper.Comment: 19 PAGE
- …