Peer-to-Peer Networks Protocols, Cooperation and Competition
|
|
|
- Oswald Fletcher
- 10 years ago
- Views:
Transcription
1 Peer-to-Peer Networks Protocols, Cooperaton and Competton Hyunggon Park Sgnal Processng Laboratory (LTS4), Insttute of Electrcal Engneerng, Swss Federal Insttute of Technology (EPFL), Lausanne, Swtzerland Raft Izhak Ratzn Computer Scence Department, Unversty of Calforna, Los Angeles (UCLA), Los Angeles, USA Mhaela van der Schaar Multmeda Communcatons and Systems Laboratory, Electrcal Engneerng Department, Unversty of Calforna, Los Angeles (UCLA), Los Angeles, USA 1. INTRODUCTION Peer-to-peer (P2P) networks connect many end-hosts (also referred to as peers) n an ad-hoc manner. P2P networks have been typcally used for fle sharng applcatons, whch enable peers to share dgtzed content such as general documents, audo, vdeo, electronc books, etc. Recently, more advanced applcatons such as real-tme conferences, onlne gamng, and meda streamng have also been deployed over such networks. Unlke tradtonal clent-server networks, where servers only provde content, and clents only consume content, n P2P networks, each peer s both a clent and a server. It has been observed that P2P fle sharng applcatons domnate Internet traffc usage. In fact, a wde range of measurements, whch were performed n 8 dfferent geographc regons durng the years of , show that P2P networks generated most of the traffc n all montored regons, rangng from 43% n Northern Afrca to 70% n Eastern Europe ( The same study also dentfed that BtTorrent (Cohen, 2003) s the most popular protocol on the Internet, generatng most of the traffc n 7 out of 8 regons rangng from 32% n South Afrca to 57% n Eastern Europe. The detals of the BtTorrent protocol wll be dscussed n Secton 3. Recently, meda delvery and streamng servces over the Internet such as YouTube ( PPLve ( and Internet vdeo broadcastng (e.g., AOL broadcast, MSNBC, CBS, etc.) have emerged. These servces have become very popular, as they can delver vdeo to a large number of recevers smultaneously at any gven tme. In order to reduce nfrastructure, mantenance, and servce costs, and provde more relable servces, the content provders often mplement ther servces usng P2P network.
2 Whle several desgns for P2P systems have been successfully deployed for fle sharng and real-tme meda streamng, key challenges such as the desgn of optmal resource recprocaton strateges among self-nterested peers stll reman largely unaddressed. For example, pull-based technques (Cohen, 2003; Pa et al., 2005; Zhang et al., 2005) are desgned assumng that peers are altrustc and are wllng to provde ther avalable data chunks (peces) whenever requested. However, such assumptons may be undesrable from the perspectve of a self-nterested peer, whch ams to maxmze ts own utlty. Thus, effcent resource recprocaton strateges need to be deployed, whch can also provde ncentves to the peers for ther contrbutons. In BtTorrent systems, ncentve strateges are based on the so-called tt-for-tat (TFT) strategy, where a peer selects some of ts assocated peers (.e., leechers), whch are currently uploadng at the hghest rates, and provdes them ts content for downloadng (Cohen, 2003). Ths smple strategy s currently mplemented n BtTorrent systems, and provdes good performance. However, a key dsadvantage of ths resource recprocaton strategy s that peers decde how to determne ther resource recprocaton based on only the current upload rates that t receves from ts assocated peers, and does not consder how ths recprocaton wll mpact ther upload rates n the future. In other words, the resource recprocaton based on the TFT s myopc. Snce peers n P2P networks are generally nvolved n repeated and long-term nteractons, such myopc resource recprocaton strategy can result n a suboptmal performance for the nvolved peers. More advanced resource recprocaton strateges have been recently proposed n (Park & van der Schaar, 2009), where the resource recprocaton among the nterested peers s modeled as a stochastc game (Fudenberg & Trole, 1991). In ths framework, peers determne ther resource dstrbutons by explctly consderng the probablstc behavors (recprocaton) of ther assocated peers. Unlke exstng resource recprocaton strateges, whch focus on myopc decsons, t formalzes the resource recprocaton game as a Markov Decson Process (MDP) (Bertsekas, 1976) to enable peers to make foresghted decsons on ther resource dstrbuton n a way that maxmzes ther cumulatve utltes,.e., the sum of ther mmedate and future utltes. Thus, ths strategy can mprove the performance of the peers, whch are generally nvolved n long-term and repeated nteractons. When the foresghted strateges are deployed n practce, the peers bounded ratonalty should be consdered, because perfectly ratonal decsons are often nfeasble n practce due to ther memory and computatonal constrants. Peers can only have lmted knowledge of the other players behavor and lmted ablty to analyze ther envronment. Therefore, t s essental to study the mpact of the peers bounded ratonalty on 1) the performance degradaton of the proposed resource recprocaton strategy and 2) ther repeated nteractons (resource recprocaton). Ths chapter s organzed as follows. In Secton 2, we overvew varous P2P network structures and dscuss ther advantages and dsadvantages. In Secton 3, we dscuss the BtTorrent system, whch s one of the most popular fle sharng protocols. We also dscuss the lmtatons of BtTorrent systems. In Secton 4, we overvew exstng P2P-based meda streamng applcatons, and dscuss how several mechansms have been developed to support real-tme meda streamng requrements. In Secton 5, we show the recently proposed foresghted resource recprocaton strateges, whch can mprove the performance of P2P-based applcatons. In Secton 6, we dscuss new drectons for game-theoretc approaches to ncentve desgn n P2P networks. Conclusons of ths chapter are drawn n Secton OVERVIEW OF P2P SYSTEM STRUCTURES
3 P2P systems can be classfed nto two dfferent classes: structured P2P systems and unstructured P2P systems. In structured P2P systems, connectons among peers n the network are fxed, and peers mantan nformaton about the resources (e.g., shared content) that ther neghbor peers possess. Hence, the data queres can be effcently drected to the neghbor peers that have the desred data, even f the data s extremely rare. Structured P2P systems mpose constrants both on node (peer) graph and on data placement to enable effcent dscovery of data. The most common ndexng that s used to structure P2P systems s the Dstrbuted Hash Tables (DHTs) ndexng. Smlar to a hash table, a DHT provdes a lookup servce wth (key, value) pars that are stored n the DHT. Any partcpatng peers can effcently retreve the value assocated wth a gven unque key. However, ths may result n hgher overhead compared to unstructured P2P networks. Dfferent DHT-based systems such as Chord (Stoca et al., 2001), Pastry (Rowstron & Druschel, 2001), Tapestry (Zhao et al., 2004), CAN (Ratnasamy et al., 2001) are dfferent n ther routng strateges and ther organzaton schemes for the data objects and keys. Unlke structured P2P systems, n unstructured P2P systems, connectons among peers n the network are formed arbtrarly n flat or herarchcal manners. In order to fnd as many peers that have the desred content as possble, peers n unstructured P2P systems query data based on several technques such as floodng (e.g., among the super-peers n KaZaA ( random walkng (Gkantsds et al., 2004), and expandng-rng (e.g., Tme-To-Lve counter n Gnutella ( Three dfferent desgns of unstructured P2P systems exst: centralzed unstructured P2P systems, hybrd unstructured P2P systems, and decentralzed (or pure) unstructured P2P systems. In a centralzed unstructured P2P system, a central entty s used for ndexng and bootstrappng the entre system. In contrast to the structured approach, the connecton between peers n the centralzed unstructured approach s not determned by the central entty. A BtTorrent network dscussed n Secton 3 s an example of a centralzed unstructured P2P network. Napster ( the network that poneered the dea of P2P fle sharng, s another example of a centralzed desgn. In Napster, a server (or server farm) s used to provde a central drectory. A peer n the network nforms the drectory server of ts IP address and the names of the contents that t makes avalable for sharng. Thus, the drectory server knows whch objects each peer n the network have, and then, creates a centralzed and dynamc database that maps content name nto a lst of IPs. The man drawback of Napster s desgn s that the drectory server s a sngle pont of falure. Hence, f the drectory server crashes, then the entre network wll also collapse. Moreover, ncreasng the sze of the network may cause a bottleneck n the drectory server, due to the need of respondng to many queres and mantanng a large database for ths meta-data nformaton. The bottleneck can only be resolved by addng more nfrastructure (e.g., more servers), whch may be expensve. The decentralzed (or pure) unstructured P2P network s an overlay network. An overlay network s a logcal network. An edge n ths network exsts between any par of peers that mantan a TCP connecton. The decentralzed unstructured overlay network s flat, meanng that all peers act as equals. There s nether a central server that manages the network, nor are there preferred peers wth a specal nfrastructure functon. The network has a sngle routng layer. Gnutella ( s an example of a decentralzed unstructured P2P network. In order to jon the Gnutella network, a user ntally connects to one of several knownbootstrappng peers. The bootstrapped peers then respond wth the nformaton about one or more exstng peers n the overlay network. Ths nformaton ncludes the IP address and port of each peer. The peers n Gnutella are aware only of ther neghbor peers. Peers that are connected wth
4 each other n the overlay network have a common vrtual edge n the overlay network. In Gnutella, queres are dstrbuted among the peers usng a varaton of a floodng mechansm. A peer that s nterested n specfc content sends a query to ts neghbors n the overlay network. Every neghbor then forwards the query to all of ts neghbor peers. The procedure contnues untl the query reaches a specfc depth of search lmt (counted by Tme-To-Lve counter). Upon recevng a flood query, a peer that has a copy of the desred content sends a query ht response to the peer that orgnated the query, whch s an ndcaton of havng the content. The response s sent on the reverse path of the query, usng pre-exstng TCP connectons. The peer that orgnated the query then selects one peer from the responded peers, and downloads the desred content through a drect TCP connecton from the selected peer. Although Gnutella desgn s smple, hghly decentralzed, and does not requre peers to mantan nformaton related to locaton of contents, t s often crtczed for ts non-scalablty. Ths s because query traffc can grow lnearly wth the total number of queres, whch n turn grows wth the system sze. In addton, another drawback of the protocol s that a peer that orgnated the query may not fnd the desred content especally f the content s rare. A hybrd unstructured P2P network allows the exstence of nfrastructure nodes, often referred to as super-peers (or super-nodes or overlay nodes). Ths creates a herarchcal overlay network that addresses the scalng problems on pure unstructured P2P networks such as Gnutella. A peer n such network can typcally change roles over tme. For example, a regular peer can become a super-peer that takes part n coordnatng the P2P network structure. KaZaA ( whch s based on the FastTrack ( protocol, s an example of a hybrd unstructured P2P network. Ths network uses specally desgnated superpeers wth hgh bandwdth, dsk space and processng power. When a peer jons the network, t s assgned to a super-peer. The peer then nforms ts super-peer about the content that t wll share. The super-peer facltates the search by mantanng a database that maps content to peers, and tracks only the content of ts assgned peers. Smlar to the centralzed desgn, the super-peer plays the role of a drectory server, although only to ts assgned peers. The super-peers together create a structured overlay of super-peers, whch makes search for content more effcent. A query n ths network s routed to a super-peer. Then, as n the decentralzed desgn, the query s flooded n the overlay super-peer network. The super-peer then responds to the peer that orgnated the query wth a lst of peers havng the content. The hybrd networks are no longer dedcated to a sngle server, snce the database s dstrbuted among the super-peers. Moreover, the sze of the database s relatvely small, snce each super-peer tracks only the contents of ts assgned peers. However, the drawback of ths approach s that t s consderably complcated, and requres non-trval mantenance of the overlay network. Moreover, the fact that super-peers may have more responsbltes than ordnary peers can result n a bottleneck. 3. P2P-BASED FILE SHARING: BITTORRENT SYSTEMS BtTorrent s a popular peer-to-peer fle sharng protocol that was created by Cohen (2003). BtTorrent has been shown to scale well wth large number of partcpatng end hosts. Ipoque ( measurements for years show that BtTorrent s the domnant protocol n the Internet, and that t accounted for approxmately 20-57% of all Internet traffc dependng on the geographcal locaton.
5 3.1 System Descrpton BtTorrent s a centralzed unstructured system, whch conssts of two nteractng unts: 1) A control level descrbes control methods such as the requred fle sharng preparaton, whch takes place pror to sharng the actual content, and the coordnaton among end hosts, whch s performed by a central entty durng the downloadng process. 2) A recprocaton level descrbes the actual data exchange among the end hosts. These two desgn levels are descrbed n detal next The BtTorrent System Desgn Control Level The BtTorrent content dstrbuton system conssts of the followng components: Data content An orgnal content provder The metanfo fle The tracker The end hosts or peers or clents A torrent, or swarm, s a collecton of end hosts (or peers) partcpatng n the download of content, where content may refer to one (e.g. the Lnux operatng system) or multple (e.g. several vdeo or audo) fles. The tracker s a server that coordnates and asssts the peers n the swarm. It mantans the lst of peers that are currently n the swarm, as well as statstcs about the peers. The tracker lstens on a BtTorrent TCP port for comng clent requests. Whle the default BtTorrent port s port 6969, several trackers may use dfferent ports. Pror to the content dstrbuton, a content provder dvdes the content nto multple peces, where each pece s typcally 256KB. Each pece s further dvded nto multple subpeces wth a typcal sze of 16KB. The content provder then creates a metanfo fle. The metanfo fle contans nformaton that s necessary for ntatng and mantanng the download process. For example, the metanfo fle contans the URL of the tracker, the name of the data fle (fles), the length of the data fle (fles), and the length of a pece. The metanfo fle may also contan nformaton related to multple data fles, and optonal nformaton such as creaton date, author s comments, name and verson of the.torrent creator, etc. The metanfo fle also contans a specal strng, whch s a concatenaton of 20-byte encoded hash values. Each value s a SHA-1 hash of a pece at the correspondng data content, whch s used for data ntegrty.
6 Data Content Dvde nto peces Upload.torrent Web page lnks to.torrent UPload.torrent.torrent Metanfo fle Creates.torrent fle Orgnal Content Provder Announce Peer lst Tracker End-user Peer Fgure 1: BtTorrent System - Pror to Fle Sharng The metanfo fle s usually uploaded to a webste, thereby makng t accessble to peers that are wllng to download content by jonng the swarm. A peer that s wllng to jon the swarm frst retreves the out-of-band metanfo fle. Then, ths peer contacts the tracker by sendng an announce HTTP GET request. The request n general may nclude necessary nformaton such as the total amount uploaded, the total amount downloaded, the number of bytes the peer stll has to download, an event descrpton such as started f t s the frst request to the tracker, completed f the peer shut down gracefully, stopped f the download completed. Ths nformaton helps the tracker keep overall statstcs about the torrent (e.g., number of seeds, number of leechers, lfe tme of a seed, etc). The tracker responds back wth a "text/plan" document, whch ncludes a randomly selected set of peers that are currently onlne. A typcal sze of a peer set s 50. The random peer set may nclude both seeds and leechers. Seeds are the peers who already have the entre content and are sharng t wth others. Leechers are the peers who are stll n the process of downloadng (.e. they do not possess the entre fle). The new peer can then ntate new connectons wth the peers n the swarm and start to exchange data content peces. The maxmum number of connectons that a peer can open s lmted n BtTorrent to 80 n order to avod performance degradaton due to competton among concurrent TCP flows. In addton, the new peer s also lmted to establsh a fxed number of outgong connectons, typcally 40, n order to ensure that some connecton slots are kept avalable for new peers that wll jon at a later tme. Fgure 1 portrays the prelmnary steps that need to be performed before startng to dstrbute the data content. A peer that has already begun downloadng may contact the tracker and ask for more peers f ts peer set falls below a gven threshold, whch s typcally set to 20 peers. Moreover, usually there s a mnmum nterval between two consecutve peer requests to avod overwhelmng the tracker. In addton, peers contact the tracker perodcally, typcally once every 30 mnutes, to ndcate that they are stll present n the network. If a peer does not contact the tracker for more than 45 mnutes, the tracker assumes that the peer has left the system and wll remove the peer from the torrent lst.
7 3.1.2 The BtTorrent System Desgn Recprocaton Level The connecton between two peers starts wth a handshake message followed by control and data message exchanges. The control messages between peers n the swarm as well as data messages are transferred over the TCP protocol. The range of TCP ports, whch s used by BtTorrent clents s The connecton between peers s symmetrc and the control messages n both drectons have the same format. The data can flow n ether drecton. The messages that are used n a connecton between two peers are: Handshake: the handshake message s a requred message that ensures connectons from both sdes and must be the frst message that s sent by the peer. Btfeld: the btfeld message s an optonal message and may only be sent after the handshakng sequence s completed, and before any other messages are sent. A peer can choose not to send ths message f t has no peces. Usng a sngle bt for every pece, bts that are set ndcate vald and avalable peces, whch can be shared wth other peers, and bts that are cleared ndcate mssng peces, whch must be downloaded from other peers. Interested: an nterested message s a notfcaton that the sender s nterested n some of the recever s data peces. Not-nterested: a not-nterested message s a notfcaton that the sender s not nterested n any of the recever s data peces. Choke: the term choke s commonly used n BtTorrent as a verb that descrbes a temporary refusal to upload. A choke message s a notfcaton that the sender wll not upload data to the recever untl unchokng happens. Unchoke: An unchoke message s a notfcaton that the sender peer wll upload data to the recever f the recever s nterested n some of the sender s data peces. Request: a request message s used to request a subpece. Pece: a pece message s sent n response to a request message, and contans the requested subpece. Have: a have message descrbes the ndex of a pece that has been downloaded and verfed va the SHA-1 hash functon. Keep-alve: Peers may close the TCP connecton f they have not receved any messages for a gven perod of tme, generally 2 mnutes. Thus, the keep-alve message s sent to keep the connecton between two peers alve, f no message has been sent n a gven perod of tme. Cancel: a cancel message s used to cancel subpece requests. It s mostly sent towards the end of the download process (see more detals n Secton 3.3.3). A peer A n the swarm mantans a 2-bts connecton state for every assocated peer B that t s connected to. The frst bt s the chokng/unchokng bt. The second bt s the nterested/notnterested bt. The connecton state s ntalzed to choked and not nterested. Peer B transfers data to peer A only f the state of the connecton wth A s unchoked and nterested. Peer B responds to peer A s request messages wth encapsulated subpeces n pece messages. After peer A fnshes downloadng a pece, t verfes that the pece s uncorrupted. It calculates the SHA-1 value of the downloaded pece and compares ths value wth the encrypted reference value
8 of the pece that s gven n the metanfo fle. Snce the SHA-1 value s assumed to be unque, a corrupted pece s hash would not match the reference hash value. After verfyng that the pece s uncorrupted, peer A announces that t has the pece to all of ts assocated peers usng the have message. Fgure 2 shows an example of a possble message flow among peers that have an actve connecton n a BtTorrent overlay network. In the example, the connecton s establshed after peer A sends a handshake message, and B responses wth one as well. Then, peer B sends a btfeld message but peer A does not. Such a scenaro mght happen f A has no pece ready to be shared. Peer B sends a not nterested message to A, and A sends a choke message to B. Thus, data wll not flow from peer A to peer B untl both messages are replaced. On the other hand, data does flow from peer B to peer A because peer A sends an nterested message to peer B and peer B sends an unchoked message to peer A. Then, peer A requests subpeces of a partcular pece and B responds wth pece messages, uploadng the requested subpeces. Once peer A obtans the entre pece and confrms the valdty of the pece, t sends have messages to all the peers that t s connected to n the BtTorrent overlay network. Handshake Handshake Btfeld Interested Not nterested Peer A Choked Unchoked Request Pece Request PIece... Request Pece Peer B Peer C Have Have... Fgure 2: An llustratve example for a message flow among peers 3.2 Pece Selecton Mechansms In the BtTorrent system, peers download the data content n a random order, unlke other protocols such as http or ftp, where an end host downloads a fle from begnnng to end. In order to facltate such a downloadng process, when a BtTorrent applcaton s actvated n a peer, the peer frst allocates space for the entre content. Then, the peer tracks the peces that each of ts assocated peers possess. A peer s able to dentfy what peces ts assocated peers have by exchangng btfeld messages upon establshng new connectons and by trackng the have messages that ts assocated peers send after downloadng and verfyng peces. In ths way, a peer s able to select a partcular pece to download from a partcular assocated peer. The pece selecton mechansm s fundamental n achevng effcent P2P networks. A poor selecton strategy can lead to an nablty to download, e.g., when a peer s not nterested n any of the peces ts assocated peers have to offer, and vce versa, t can lead to the nablty to upload,
9 e.g., when all assocated peers are not nterested n the peces that a peer has to offer. More generally, t can prevent the peer selecton mechansm from reachng an optmal system capacty (Legout et al., 2006). BtTorrent apples the strct prorty polcy for subpece selecton. Once the frst subpece of a pece s requested, the strct prorty polcy prortzes subpeces that are part of the same pece. Ths ensures that a complete pece s downloaded as quckly as possble. The pece selecton mechansm n BtTorrent s composed of three dfferent algorthms that are appled n dfferent stages of the downloadng process. The three algorthms are Random Pece Frst, Rarest Pece Frst, and End Game Rarest Pece Frst Selecton The rarest pece s the pece that has the least amount of copes n the peer set. For every pece, the peer mantans a counter of the number of copes that exsts n ts peer set. A peer, whch runs the rarest pece frst selecton algorthm, selects the rarest mssng pece as the next pece to download. If there are multple equally-rare mssng peces, then the peer chooses at random to download one of the rarest peces. A leecher that uses the rarest pece frst algorthm wll: 1. Upload peces that many of the assocated peers are nterested n, such that uploadng can be performed when needed. 2. Increase the lkelhood that peers wll offer peces through the entre downloadng process by leavng peces that are more common to a later download. 3. When downloadng from a seed, a leecher downloads new peces frst, where new peces are those peces that no leecher has. Ths s crucal, especally when the system has a sngle seed that may eventually be taken down, snce ths can lead to the rsk that a partcular pece wll no longer be avalable. Ths s also mportant when the seeds n the system are slower than the leechers n the system. In ths case, a redundant download wastes the opportunty of a seed to upload new peces to assocated peers wth faster uploader speeds. In (Legout et al., 2006), the authors studed the effcency of the rarest pece frst selecton algorthm n BtTorrent. More specfcally, they evaluated the effcency of the rarest pece frst selecton strategy by characterzng the entropy of the system, wth peer avalablty. They defned peer avalablty as the rato of tme that a peer s nterested n ts assocated peer. They showed that the rarest pece frst strategy can acheve a close to deal entropy, when each leecher s almost always nterested n all other leechers Random Pece Frst Selecton The download tme of a random pece wll be shorter on average than the download tme of the rarest pece. A pece that s chosen at random s lkely to be more replcated than the rarest pece, and thus, ts download tme wll be shorter on average by downloadng smultaneously from more peers. Despte ths, the download tme of complete pece may not affect the performance of a peer that uses the rarest-frst pece selecton strategy f the peer has other complete peces to share. However at the begnnng of the downloadng process, a leecher has no peces to share, and thus, the leecher should download peces faster than n the rarest-frst pece selecton strategy, as t s mportant for a new peer to obtan some complete peces and to start recprocate peces. Hence, at the begnnng of the process the peer selects a pece to download at random, whle applyng the random pece frst selecton algorthm. Once the peer downloads C
10 peces that are ready to be shared (C s a constant that may vary n dfferent BtTorrent clent mplementatons), the leecher swtches to the rarest pece frst selecton algorthm End Game Pece Selecton The end game pece selecton algorthm s performed after a peer has requested all the subpeces of the content. In ths phase, a peer sends a request to all of ts assocated peers for all of the pendng subpeces (.e., those subpeces that have not been receved yet). Ths step s performed n order to avod potental delays at the end of the content download, whch can occur f a request has been sent to a peer havng a very slow upload rate nstead of a peer havng a fast upload rate. Snce multple requests for the same subpeces are sent out, once a subpece s downloaded n the end game phase, the peer sends cancel messages to ts assocated peers so they do not waste upload bandwdth by sendng redundant data. The end game s performed at the very end of the process, and thus, t may have only a small mpact on the downloadng process. 3.3 Peer Selecton Mechansms In BtTorrent, peers download from whom they can, and upload smultaneously to a constant number of peers. The number of assocated peers, whch a peer uploads to, s lmted n order to avod sendng data over many connectons at once, whch may result n poor TCP congeston control behavor. Thus, peers need to make decsons on whch peers to unchoke. The default number of peers to unchoke (unchoke slots) s four. However, ths number may ncrease unless a peer s upload bandwdth s saturated. A peer ndependently makes the decson regardng whom to unchoke and whom to choke, n every unchoke perod whch s typcally ten seconds. The peer uploads to unchoked peers for the duraton of the unchoke perod. The peer selecton mechansm, whch s also referred to as the chokng mechansm, can affect the performance of the system. A good chokng mechansm should: 1) Motvate peers to contrbute and upload data to the network, 2) Utlze all avalable resources, 3) Be robust aganst free-rdng behavors where peers only download and do not upload. In BtTorrent, the peer selecton (chokng) mechansm s appled dfferently to peers that are leechers and those that are seeds Leecher s Peer Selecton Mechansm The leecher s peer selecton mechansm has two parts: The TFT mechansm and the optmstc unchoke mechansm The TFT Mechansm In the TFT peer selecton mechansm, a leecher decdes to unchoke peers from whch t currently downloads data. It chooses the peers who have the hghest upload rate. The dea of TFT s to have several connectons that actvely transfer data n both drectons at any tme. In order to avod wastng of resources due to rapdly chokng and unchokng peers, the desgner of the protocol sets the rechoke perod to 10 seconds, clamng that Ten seconds s a long enough perod of tme for TCP to ramp up new transfers to ther full capacty (Cohen, 2003) The Optmstc Unchoke Mechansm
11 BtTorrent apples the optmstc unchoke mechansm n parallel wth the TFT mechansm. The goals of the optmstc unchoke mechansm are: 1) to enable a contnuous dscovery of better peers to recprocate wth, 2) to bootstrap new leechers that do not have any content peces to download some data and start recprocate peces wth others. The optmstc unchoke mechansm chooses to unchoke a peer randomly regardless of ts current upload rate. Optmstc unchoke s rotated every optmstc unchoke perod, when an optmstcally unchoked peer s unchoked for the entre optmstc unchoke perod. The desgner of the protocol chose the optmstc unchoke duraton to be 30 seconds, because 30 seconds s enough tme for the upload to get to full capacty, for the download to recprocate, and fnally for the download to get to full capacty. Optmstc unchoke s typcally appled on a sngle unchoke slot whle TFT s appled on the rest of the unchoke slots Ant-snubbng If a peer has receved no data from a partcular peer for a certan perod of tme, typcally 60 seconds, t marks the partcular peer s connecton as snubbed. A peer does not upload to an assocated snubbed peer through the TFT peer selecton mechansm. Ths may result n more than one smultaneous optmstc unchoke, when the peer s choked by many of ts assocated peers. In such a case, the peer may experence poor download rates untl the optmstc unchoke fnds better peers. Thus, ncreasng number of optmstc unchokes n ths scenaro s mportant Seed s Peer Selecton Mechansm Seeds, whch do not need to download any peces, follow a dfferent chokng mechansm than the leechers. The most common mechansm s based on a round-robn mechansm, whch strves to dstrbute data unformly Modelng the Peer Selecton Mechansm Many researchers studed the chokng mechansm n BtTorrent by suggestng mathematcal and game theoretcal models. Qu & Srkant (2004) studed a flud analytcal model of BtTorrent systems. They analytcally studed the chokng mechansm and nvestgated how t affects the peer performance. They showed that the optmstc unchoke mechansm may allow free-rdng. Fan et al. (2006) characterzed the desgn space of BtTorrent-lke protocols capturng the fundamental tradeoff between performance and farness. Other works such as (Izhak-Ratzn, 2009; Izhak-Ratzn et al., 2009; Negla et al., 2007) model the chokng mechansms n BtTorrent as games wth strategc peers. Massoulé & VojnovĆ (2005) ntroduced a probablstc model of coupon replcaton systems, and they argued that performance of fle sharng system such as BtTorrent does not depend crtcally on altrustc behavor or on pece selecton strategy (e.g., the rarest frst algorthm). Levn et al. (2008) presented an aucton based model of the peer selecton mechansm. They clamed that the nsght behnd ther model s that BtTorrent uses an aucton model to decde whch peers to unchoke and not to tt-for-tat as wdely beleved. 3.4 Lmtatons of BtTorrent Systems In addton to the analytcal models of BtTorrent, some measurement studes have been performed (Guo et al, 2005; Izal et al., 2004; Pouwelse et al., 2005; Patek et al., 2007; Patek et al., 2008). Most of these studes were performed on peers that were connected to publc torrents. These studes provde nterestng results about the overall behavor of deployed BtTorrent
12 systems. The studes also pnpont several lmtatons of the BtTorrent protocol. In ths secton, we dscuss two of the lmtatons of BtTorrent protocol that were shown n these studes: 1) The feasblty of free-rdng, 2) The lack of farness Free-Rdng n BtTorrent Systems Free rders are the peers who attempt to crcumvent the protocol mechansm and download data wthout uploadng data to other peers n the network. Researchers have argued that freerdng n BtTorrent s feasble through the optmstc unchoke mechansm and through seeds. The frst to pnpont that effectve free-rdng n BtTorrent s feasble was Shnedman et al. (2004). They brefly descrbed a scenaro n whch peers can attack the tracker whle they explot nvolved leechers by lyng about the peces they have. Jun et al. (2005) also argued that freerdng s feasble n BtTorrent by nvestgatng the ncentves n BtTorrent chokng mechansm. Logkas et al. (2006) showed that free-rdng n BtTorrent s feasble by mplementng three selfsh BtTorrent explots that allow free-rders to acheve hgh download rates and evaluate ther effectveness under specfc crcumstances. Locher et al. (2006) extended these results and presented the BtThef, a free-rdng clent that combnes several attacks. They demonstrated that free-rdng s feasble even n the absence of seeds. More recently, Srvanos et al. (2007) evaluated an explot based on mantanng a larger-than-normal vew of the system, whch affords free-rders a much hgher probablty of recevng data from seeds and optmstc unchokes. They argued that the large vew explot s effectve and has the potental for wde adopton. Wde adopton of free-rdng strategy can result n a tragedy of the commons, where overall performance n the system wll decrease. Several works have attacked the ablty of free-rders to download data from seeds wthout uploadng n return, ntendng to consderably hurt free-rders performance. Locher et al. (2007) proposed a source-codng scheme. Seeds n ths scheme only upload a fxed number of content peces to each leecher they connect to, thereby placng a hard lmt on the data that free-rders can obtan n ths manner. Chow et al. (2008) presented an alternatve modfed seed unchokng algorthm that gves preference to leechers that are ether at the begnnng or the end of ther download. Complementary to these approaches that modfy the seed strategy, other works suggested to replace or lmt the optmstc unchokes. Izhak-Ratzn et al. (2009) suggested a team mechansm that lmts the optmstc unchokes as the collaboraton wth peers havng smlar upload rate ncreases. A foresghted resource recprocaton mechansm was suggested n (Izhak-Ratzn et al., 2009b) to replace the chokng mechansm n BtTorrent. Fnally, reputaton systems such as (Buchegger & Le Boudec, 2004; Xong & Lu, 2004; Yang et al., 2005) that use a peers reputaton hstory to make the chokng decson were also suggested n order to help lmt the ablty to free-rde Lack of Farness n BtTorrent Systems Farness n BtTorrent s commonly defned as receve as much as they gve. Farness among peers partcpatng n content dstrbuton encourages peers to actvely collaborate n dssemnatng content. Thus, farness s an mportant factor, whch can lead to mproved system performance. However, research studes, such as (Guo et al., 2005; Patek et al., 2007; Bharambe et al., 2006; Legout et al., 2007), show that BtTorrent does not provde far resource recprocaton, especally n node populatons wth heterogeneous upload bandwdths. Two of the
13 mechansms that contrbute to the lack of farness are the TFT and optmstc unchoke mechansms, whch are used for peer selecton n BtTorrent. The TFT mechansm s based on a short-term hstory,.e., upload decsons are made based on the most recent observatons of resource recprocaton. Thus, a peer can follow the TFT polcy only f t contnuously uploads peces of a partcular fle and as long as t receves peces of nterest n return. However, ths s not always possble because peers may not have any peces that other peers are nterested n, regardless of ther wllngness to cooperate (Patek et al., 2008). Ths behavor s stll perceved as a lack of cooperaton. The mpact of optmstc unchokes on farness n the BtTorrent system s shown n Fgure 3 [the Fgure s taken from (Izhak-Ratzn, 2009)], whch shows the mpact of optmstc unchokes on the expected download rate as a functon of the peer s upload rate. The peer upload rate dstrbuton s based on observed bandwdth dstrbuton gven n (Patek et al., 2007). It s assumed that one unchoke slot s used by the optmstc unchoke mechansm, and that the regular unchoke mechansm works perfectly n terms of farness,.e., the download rate and the upload rate through TFT unchokes are equal. Clearly, we can see that the sub-lnear behavor of the expected download rate leads to unfarness for hgh capacty leechers that are forced to nteract wth low-capacty peers, and low-capacty leechers that beneft from ths unfarness. Note that n the observed bandwdth dstrbuton, the majorty of the leechers are low-capacty leechers wth 88% of the leechers havng less than 300KB/s upload capacty. Expected download rate (KB/sec) optmal download rate expected download rate Upload capacty (KB/sec) Fgure 3: Upload and download n BtTorrent network Fnally, the number of unchoke slots may also lead to a lack of farness n BtTorrent. The number of unchoke slots that a leecher uses for regular unchoke s a functon of the leecher s ablty to fully utlze ts upload capacty. Ths agan may lead to unfarness, snce typcally, n real torrents, the download capacty of a leecher may be greater than the upload capacty. Thus,
14 hgh capacty leechers may upload n full capacty, but not be able to download as much, due to upload constrants of the downloadng leechers and lmted number of unchoke slots. Farness n BtTorrent systems has been largely dscussed n the lterature. Guo et.al. (2005) performed extensve measurements of real torrents and pnponted several BtTorrent lmtatons ncludng lack of farness. Bharambe et al. (2006) utlzed a dscrete event smulator to evaluate the mpact of BtTorrent s mechansms such as the peer selecton mechansm, and observed that rate-based TFT ncentves cannot guarantee farness. They suggested a block-based TFT polcy to mprove farness. Legout et al. (2007) studed clusterng of peers havng smlar upload bandwdth. They observed that when the seed s underprovsoned, all peers tend to complete ther downloads approxmately at the same tme, regardless of ther upload rates. Moreover, hghcapacty peers assst the seed to dssemnate data to low-capacty peers. Patek et al. (2007), observed through extensve measurement on real torrents the presence of sgnfcant altrusm, where peers make contrbutons that do not drectly mprove ther performance. They proposed the BtTyrant clent, whch adopts a new peer selecton mechansm that reallocates upload bandwdth to maxmze peers download rates. Izhak-Ratzn (2009) dentfed the potental of there beng a sgnfcant dfference between a leecher s upload and download rates and proposed the Buddy protocol that matches peers wth smlar bandwdth. Other researchers acknowledged the mportance of cooperaton ncentves through addtonal reputaton mechansm. Anagnostaks & Greenwald (2004) extended BtTorrent s ncentves to n way exchange among rngs of peers, provdng ncentve to cooperate. Later, Lan et al., (2006) proposed mult-level TFT ncentves as a hybrd between prvate and shared hstory schemes. More recently, Patek et al., (2008) proposed a one-hop reputaton system, n whch peers that are not nterested n the current avalable content perform data exchanges for the assurance of future payback. 4. P2P-BASED MEDIA STREAMING 4.1 Challenges and Requrements for Meda Streamng As dscussed n Secton 3, several protocols and ncentve mechansms have been developed for effcent data dssemnaton over P2P networks. However, they may only provde a lmted performance for meda streamng, because meda streamng needs much more consderaton such as real-tme and hgh bandwdth requrements than general data dssemnaton. Extensve studes on vdeo transmsson over IP multcast have dscussed n the lterature (e.g., Lu et al., 2003; van der Schar & Chou, 2007), and varous P2P based overlay multcast systems have also been recently proposed (e.g., Zhang et al., 2005; Lang et al., 2009; Ln et al., 2009). Unlke proxyasssted overlay multcast systems, where several proxes are coordnated and placed such that an effcent overlay can be constructed (Zhuang et al., 2001; Guo et al., 2004; Hefeeda et al, 2004; Sh & Turner, 2002), the P2P based systems do not need such dedcated nodes and coordnaton. Rather, these systems consst of autonomous and often self-nterested nodes that self-organze nto groups, exchange nformaton, and share ther data. Desgnng effcent protocols and mechansms for the meda streamng applcatons over P2P networks s challengng, because:
15 the real-tme and contnuous delvery of content to a large number of partcpants should be supported n dynamcally changng network condtons and groups of nteractng peers, and a hgher bandwdth s requred n general. Therefore, the meda streamng applcatons requre dfferent desgn rules and approaches that consder such requrements. For example, the objectve of the fle sharng applcatons such as BtTorrent s to completely download the content data as fast as possble. Therefore, the tmely downloadng of data objects s not crtcal. Rather, downloadng data objects that can be rarely found s more mportant. However, meda streamng applcatons should consder strngent realtme constrants. Thus, a mechansm that enables peers to download data objects that meet the playback deadlne s requred, such that meda streamng s unnterrupted. Second, each data object has an equal mportance for fle sharng P2P applcatons, as all the data objects should be completely downloaded. However, for meda streamng applcatons, each data object has dfferent mportance based on the codng structure, playback deadlne, etc. Thus, data objects that have hgher qualty mpact or that have strngent playback deadlne can have hgher prorty. Therefore, packet prortzaton and schedulng mechansms should be developed n the meda streamng applcatons over P2P networks. Fnally, a mechansm that provdes graceful qualty degradaton also needs to be mplemented, whch enables adaptve and flexble meda streamng n dynamc networks where heterogeneous peers havng dfferent bandwdth nteract wth each other. In order to address these challenges, several solutons for meda streamng have been proposed n the lterature (see e.g., Vlavanos et al., 2006; Zhang et al., 2006; Banerjee et al., 2002; Castro et al., 2003; Deshpande et al., 2001; Trans et al., 2004; Heffeeda et al., 2003; Kostc et al., 2003; Pa et al., 2005; Padmanabhan et al., 2003; Tan et al., 2005; Venkataraman et al., 2006; Zhang et al., 2005b). The mplementaton of these solutons vares dependng on ther focuses, whch can be broadly classfed as 1) peer clusterng strateges, 2) overlay constructons and 3) ncentve strateges on resource recprocatons. 4.2 Peer Clusterng Strateges Several approaches for effcent and relable delvery of meda streams over P2P networks have focused on developng peer clusterng strateges. As dscussed, the meda content s drectly shared by peers nteractng wth each other. Hence, t s mportant to select good peers and form clusters (or groups) wth them. For example, Purandare & Guha (2007) proposed that peers can form groups based on allance formaton process, where ths process consders the tme and resource constrants. In (Venkataraman et al., 2006), the partcpatng nodes form a graph, where the degree of the graph s determned proportonally to ts desred transmsson load. In addton, several other strateges such as SpreadIt (Deshpande et al., 2001), NICE (Banerjee et al., 2002), and ZIGZAG (Banerjee et al., 2002) have been proposed, where these algorthms perform herarchcally from clusters such that a mnmzed transmsson delay can be acheved. In order to enhance the effcency and robustness of the meda delvery, varous codng structures and packetzng strateges can also be mplemented n conjuncton wth the abovementoned clusterng strateges. For nstance, Multple Descrpton Codng, or MDC (Goyal, 2001), s an llustratve example of codng structure for P2P based meda delvery, and ts deployment for meda delvery has been studed n e.g., Padmanabhan et al., 2003; Padmanabhan
16 et al., 2002b; Chu et al., 2004; L et al., Alternatvely, network codng technques are also deployed for effcent meda delvery (e.g., Nguyen et al., 2007; Wang & L, 2007; Wang & L, 2007b; Gkantsds & Rodrguez, 2005). 4.3 Overlay Constructons: Tree-based and Data-drven Approaches Tree-based Approach: Descrpton One of desgn approaches of data dssemnaton over P2P networks s based on tree structure. In ths approach, peers are organzed nto tree structure, where each peer s partcpatng n dssemnatng data. In general, peers (or nodes) n the tree are herarchcally organzed (.e., parent chldren node relatonshp) and data s dssemnated by typcally push-based approach, where the data s forwarded from parent nodes to chldren nodes. Because the data s dssemnated n a structured way, t s mportant to 1) desgn optmal tree constructons that provde an effcent performance to each peer, 2) develop approaches for tree constructon that are robust to nodes (unexpected) jonng and leavng trees and provde easy tree repar, and 3) construct non-cyclc trees,.e., trees that have no loops. Note that one of the major concerns n ths approach s the falure of nodes. If a node cannot approprately perform forwardng data due to node crash or node malfuncton, ts chldren nodes n the tree receve no data packets, resultng n sgnfcantly poor performance. Moreover, snce a sgnfcantly large number of nodes are located n the end of the trees, an effcent utlzaton of outgong bandwdth of them s challengng. In order to address these ssues, several approaches have been proposed (e.g., Chu et al., 2000; Deshpande et al., 2001; Padmanabhan & Srpandkulcha, 2002; Padmanabhan et al., 2002b; Padmanabhan et al., 2003; L et al., 2004). In order to successfully mplement the tree-based approaches, the followng mechansms have been proposed Group Management Mechansm To mantan a robust and effcent tree, each peer (or node) may need the nformaton about a set of other nodes and the path from a source. Peers n a tree keep exchangng the nformaton that they have, whch may nclude the group member nformaton, and thus, they can have updated nformaton about the tree. The nformaton exchange can be mplemented based on gossp-lke protocols (e.g., End System Multcast, ESM, (Chu et al., 2000)). Peers already partcpatng n a tree can swtch ther parent nodes f the performance (e.g., download rates) acheved n a current poston s not satsfed. If a peer newly jons the network (.e., a tree), t contacts the server, and obtans the (partal) nformaton about the exstng peers and the correspondng paths. Then, the peer can determne ts parent nodes. Fnally, the records of peers that left the tree are smply removed from the group member lst Parent Selecton Algorthm As dscussed, the way of selectng parents s mportant for both peers n a tree and newly jonng peers. In order to select the parent nodes, a peer can contact a node that s randomly chosen from
17 ts group member lst. Then, t retreves the nformaton that ncludes the currently acheved performance, the number of chldren nodes, etc. from the contacted node, whle estmatng the round-trp tme. The peer evaluates the contacted node only f the contacted node s not ncluded n ts chldren nodes, and the contacted node has not exceeded ts chldren nodes lmt. The evaluaton of the contacted node can nclude the achevable performance and nduced delay. Several crtera can be deployed n order to evaluate the node based on goals of applcatons. For fle sharng applcatons, the performance (.e., bandwdth) can be one of the most mportant crtera. For meda streamng applcatons, however, the delay may be the most mportant crteron for parent selecton. Alternatvely, the obtaned meda qualty can also be a crteron for parent selecton (Park and van der Schaar, 2009d) Data-drven Approach Alternatve approaches for data dssemnaton over P2P networks are based on data-drven structures (Pa et al., 2005; Zhang et al., 2005). Unlke the tree-based structures, where welldesgned trees need to be constructed and contnuously mantaned for effcent data dssemnaton n dynamcally changng networks, data-drven approaches focus on 1) how to effcently exchange nformaton about the data avalablty, 2) how to form groups of peers and share ther data, and 3) how to develop group management algorthms and schedulng algorthms. In data-drven approaches, a newly generated data of a peer can be forwarded to ts randomly selected neghbor nodes, and the neghbor nodes also forward the data to ther neghbor nodes, whch can be contnued. Fnally, the messages can be dstrbuted to all the nodes. Ths approach can be mplemented based on gossp algorthms (Eugster et al., 2004). Whle such random push approaches enable the P2P systems to be robust to the random node falures, whch s one of challenges for tree-based approach, these approaches may result n sgnfcant redundancy for recevng nodes (Gkantsds et al., 2004). In order to reduce the redundancy, pull-based technques are proposed (Cohen, 2003; Pa et al., 2005; Zhang et al., 2005). In pull-based technques, peers self-organze nto groups and each peer requests necessary data packets from other peers n ts group. Thus, each peer can avod recevng redundant packets from ts neghbor peers. The metadata that may nclude nformaton about the peers can be downloaded from a server (e.g., trackers n BtTorrent systems), and then, each peer forms a group (e.g., swarm) wth the other randomly selected peers or jons an exstng group. The groups can be mantaned by perodcally exchangng the nformaton about data avalablty wth the group members. Ths approach has been actually mplemented n BtTorrent (Cohen, 2003), and has shown effcent performance for general fle sharng. In ths example, a source dstrbutes ts content to peer A and peer B, and then, they exchange the content wth ther group members. Note that peer C also has ts own group (whch s not shown n ths example), whch also ncludes peer A. However, ths approach cannot be drectly deployed for meda streamng applcatons that requre explct playback deadlnes, unless approprate schedulng algorthms are mplemented. Thus, for effcent meda streamng over P2P networks based on data-drven approaches, several approaches have been proposed n (Pa et al., 2005; Zhang et al., 2005), where they explctly
18 mplement schedulng algorthms. These mechansms that support the data-drven approaches are dscussed next Group Management Mechansm One of the key mechansms requred for data-drven approaches s the group management mechansm, whch enables peers to mantan ther groups, such that they can contnuously exchange necessary data packets among the peers. For newly jonng peers, they can contact a server to obtan an ntal set of group member canddates (e.g., End System Multcast (Chu et al., 2000), BtTorrent, CoolStreamng (Zhang et al., 2005)). Based on the ntal nformaton, each peer can form a group wth partal set of peers or jon an exstng group. Then, each peer mantans ts group by exchangng the nformaton about the data avalablty. For example, CoolStreamng deploys an exstng gossp membershp protocol for exchangng the nformaton about the data avalablty, whch s referred to as membershp message. The nformaton s generated based on a Buffer Map (BM) that represents actve data segments. More detals about the BM are dscussed next Prortzaton and Schedulng Mechansms Unlke fle sharng applcatons, t s crtcal for meda streamng applcatons to delver data segments tmely and contnuously. Thus, pece selecton mechansm (.e., the rarest frst mechansm) mplemented n BtTorrent systems can only provde lmted performance, as t does not consder the prorty of each data segment when t s downloaded. In order to explctly consder the prorty of data segments, schedulng mechansms can be deployed. For example, n CoolStreamng, a sldng wndow (see Fgure 4), or BM, s used, whch conssts of 120 segments that correspond to 120 seconds of meda data (.e., 1 segment ncludes meda data of 1 second). In ths llustraton shown n Fgure 4, the peer s focusng on downloadng the segment that s not n the wndow (empty segment) wth the hghest prorty at ths playback pont. Meda Segments Playback pont Sldng wndow Fgure 4. Sldng wndow n schedulng mechansms Thus, the schedulng algorthms should be desgned whle takng nto account the playback deadlne (.e., prorty) for each segment, and the avalable upload bandwdth of assocated peers. Ths s because peers n a P2P system may be heterogeneous, havng dfferent upload bandwdth, etc. In CoolStreamng, a smple and heurstc algorthm has been proposed Group Update Mechansm In general P2P systems, peers can leave the systems, and thus, leave ther groups, at any tme, whch changes the groups that the peers have been assocated. Thus, an effcent group update
19 mechansm needs to be deployed, such that peers can easly capture the group changes and effcently respond to the changes. Ths may nclude an effcent reschedulng algorthm for data segment request, and the exchanged nformaton about data avalablty that can be used. For nstance, n CoolStreamng, the groups are perodcally updated by randomly contactng peers n local membershp lst, and the reschedulng algorthms are performed based on exchanged BM nformaton. 4.4 Incentves for Resource Recprocaton Whle several approaches dscussed n the prevous sectons provde effcent solutons to meda streamng over P2P networks, they are desgned based on an mplct assumpton that peers are uncondtonally cooperatve and collaboratve they are wllng to provde correct and true nformaton, exchange and share ther resource actvely, by honestly followng the pre-desgned protocols. However, n realty, ths s not always true. Rather, peers are often self-nterested and are tryng to maxmze ther own benefts (e.g., download rates, meda qualty, etc.) by devatng from the pre-determned rules n the systems. One of the representatve examples for selfnterested behavors of peers s the free-rdng, whch s dscussed n Secton 3. The free-rders may not contrbute ther resources whle downloadng content from the other peers (data-drven approach), or they try to become leaf nodes by ntentonally announcng that ther upload bandwdth s poor. Moreover, t has been observed from several P2P based systems that the majorty of uploadng requests are concentrated on a small set of peers (Al et al., 2006; Adar & Huberman, 2000), whch may prevent potentally cooperatve peers from actvely contrbutng ther resources. One of the reasons why such behavors that can result n sgnfcant degradaton of both the system and ndvdual peers performance are allowed s the lack of well-desgned ncentve mechansms. In order to provde ncentves for each peer s contrbuton, smple ncentve mechansms have been developed based on TFT strategy for a general fle sharng n BtTorrentlke protocols (e.g., Cohen, 2003; Legout et al., 2006; Patek et al., 2007) or for a meda streamng n BToS (Vlavanos et al., 2006). Incentves can also be provded based on each peer s reputatons, whch can be managed n varous ways (e.g., Credence (Walsh & Srer, 2006), DARWIN (Jaramllo & Srkant, 2007), EgenTrust (Kamvar et al., 2003), PeerTrust (Xong & Lu, 2004), DCRC and CORC (Gupta et al., 2003), Despotovc & Aberer, 2005). Fnally, several game theoretc approaches have been adopted for provdng ncentves (see e.g., Chen et al., 2007; Fan et al., 2006; Zhang et al., 2007; Buragohan et al., 2003; Jun & Ahamad, 2005; La et al., 2003; Golle et al., 2001; Feldman et al., 2004; Park & van der Schaar, 2009; Park & van der Schaar, 2009c). Whle smple ncentve mechansms have been developed and deployed n practce (e.g., TFT strategy n practcal BtTorrent systems), t s stll reported that exstng ncentve mechansms do not effcently prevent such self-nterested behavors n P2P systems. In the next secton, we wll dscuss recently proposed game theoretc approaches for ncentve mechansms n detal, whch model the resource recprocaton among self-nterested peers as a stochastc game and fnd an optmal strategy that maxmzes each peer s long term beneft n P2P systems 5. FORESIGHTED RESOURCE RECIPROCATION STRATEGIES
20 5.1 Challenges of Incentve Desgn Cooperaton and Competton As dscussed n Secton 4, one possble soluton for provdng cooperaton ncentves s the TFT strategy, whch has been actually mplemented n practcal fle sharng P2P systems such as BtTorrent. The TFT strategy s deployed n BtTorrent as a chokng algorthm, whch effectvely encourages peers cooperaton and penalzes peers selfsh behavors (see Secton for more detal). Whle t has been shown that ths strategy performs effectvely n varous P2P network scenaros, t may not completely elmnate selfsh behavors such as free-rdng (Logkas et al., 2007; Locher et al., 2006; Srvanos et al., 2007). Moreover, the resource recprocaton based on TFT s myopc, because a peer unchokes some of ts assocated peers (.e., leechers) that are currently uploadng at the hghest rates. Thus, the resource recprocaton decsons based on TFT may not provde optmal solutons that maxmze the long-term rewards. Snce peers n P2P networks are generally nvolved n repeated and long-term nteractons, such myopc decsons on peer selecton and bandwdth allocaton can result n a sub-optmal performance for the nvolved peers. Fnally, the TFT strategy n BtTorrent s based on the equal upload bandwdth dstrbuton (Cohen, 2003; Legout et al., 2007) whch s nether a far nor an optmal resource allocaton for heterogeneous content and dverse peers wth dfferent upload/download requrements (Park & van der Schaar, 2007). To address these challenges, a foresghted resource recprocaton strategy has been recently proposed, whch enables the peers to determne ther resource recprocaton decsons that maxmze a long-term utlty. The nteractons among the peers are modeled as a stochastc game, where they determne ther resource dstrbutons by consderng the probablstcally changng future behavors of ther assocated peers. The resource recprocaton process of a peer s modeled as a Markov Decson Process (MDP), and the foresghted resource recprocaton strategy s obtaned by solvng the MDP. It has been shown that the foresghted strategy provdes mproved performance compared to exstng ncentve mechansms n BtTorrent or heurstc algorthms n several meda streamng approaches (e.g., Lee et al., 2009). 5.2 Formalzaton of Resource Recprocaton as Stochastc Games Group-based Resource Recprocaton Resource recprocaton games n P2P networks are played by the peers nterested n each other's meda content. A resource recprocaton game s played n a group, where a group conssts of a peer and ts assocated peers. The group-based resource recprocaton has been dscussed n the lterature, where a group could be formed of swarms (Cohen, 2003; Legout et al., 2006), partnershps (Zhang et al., 2005), or neghbors (Pa et al., 2005). The group members assocated wth a peer s denoted by C, where a peer k Î C also has ts own group C k whch ncludes peer. Due to the dynamcs ntroduced by peers jonng, leavng, or swtchng P2P networks, the nformaton about groups needs to be regularly (perodcally) updated or t needs to be updated when group dynamcs change (Cohen, 2003; Legout et al., 2006). Ths process s shown n Fgure 5. In ths dagram, the group dynamcs change when group members are changed or ther behavor are changed, etc. Moreover, resource recprocaton n Fgure 5 may nclude several modules for ts actual mplementaton, such as an estmaton of the state transton probablty and a level of accuracy for behavor estmaton. These wll be dscussed n the followng sectons.
21 Fgure 5. Block dagram for group-based resource recprocaton Modelng Resource Recprocatons as Stochastc Games The resource recprocaton game n a group C conssts of a fnte set of players (.e., peers): C È {} for each peer l C È {} A l for each peer l ÎC È {}, a preference relaton (.e., utlty functon) of peer l : Ul (). To play the resource recprocaton game, a peer can deploy an MDP, defned as follows. For a peer, an MDP s a tuple S, A, P, R, where S s the state space, A s the acton space, P : S A S [0,1] s a state transton probablty functon that maps the state s Î S at tme t, correspondng acton a Î A and the next state s Î S at tme t + 1 to a real number between 0 and 1, and R : S s a reward functon, where R ( s ) s a reward derved n state s Î S. Ths MDP-based resource recprocaton model and ts varatons n P2P networks have been dscussed n (Park & van der Schaar, 2009; Park & van der Schaar, 2009b; Park & van der Schaar, 2009c). We revew the detals n the followng State Space A state of peer represents the set of receved resources from the peers n C, whch s expressed as ( x, ¼, x ) 0 x L, " k Î C (1) { 1 N k k } C where x k denotes the provded resources (.e., rate) by peer k n C and L k represents the avalable maxmum upload bandwdth of peer k. The total receved rates of peer n C s thus å kîc x k. Due to the contnuty of x k, the cardnalty of the set defned n (1) can be nfnte. Hence, we assume that peer has a functon y k for peer k, whch maps the receved resource x k nto one of n 1 n k dscrete values,.e., y ( ) {,, k k xk = sk Î sk ¼ sk }. These values are referred to as state descrptons n ths chapter. Hence, the state space can be consdered to be fnte. The state space of peer can be expressed as
22 { s ( s 1,, s ) s y ( x ), k C }, S = = ¼ = Î (2) NC k k k where s l k denotes the l th segment among n k segments that corresponds to the l th state descrpton of peer. For smplcty, we assume that each segment represents the unformly L l k Lk dvded total bandwdth,.e., y k ( xk ) = sk f ( l - 1) xk < l for 1 l nk. nk nk Acton Space An acton of peer s ts resource allocaton to the peers n C. Hence, the acton space of peer can be expressed as A = { a = ( a, ¼, a ) 0 a L, 1 k N, a L }, (3) 1 N C k C kîc k where ak Î A denotes the allocated resources to peer k by peer n C. Hence, peer 's acton a k to peer k becomes peer k 's receved resources from peer,.e., a k x k å =. To consder a fnte acton space, we assume that the avalable resources (.e., upload bandwdth) of peers are decomposed nto unts of bandwdth (Jan et al., 2007). Thus, the actons represent the number of allocated unts of bandwdth to the assocated peers n ther groups. We defne the resource recprocaton as a par (, s) = (( a1, ¼, an ),( s1, ¼, sn )) a comprsng the peer s acton, a k, C and the correspondng modeled resource recprocaton s k, whch s determne as sk = yk ( xk ) for all k Î C. Note that varous schedulng schemes can be used n conjuncton wth the resource allocaton (.e., actons) deployed by peers n order to consder the dfferent prortes of the dfferent data segments (chunks). We assume that the chunks that have hgher qualty mpact on average meda qualty have hgher prorty and are transmtted frst when each peer takes ts actons. However, other schedulng algorthms, such as the rarest frst (Cohen, 2003; Legout et al., 2007) method for general fle sharng applcatons or several schedulng methods proposed n e.g., (Zhang et al., 2005) for meda streamng applcatons, can also be adopted. It s mportant to note that approprate schedulng schemes need to be deployed n conjuncton wth our proposed resource recprocaton strateges, dependng on the objectves of multmeda applcatons (e.g. maxmzng acheved qualty, mnmzng the playback delay etc.) State Transton Probablty A state transton probablty represents the probablty that by takng an acton, a peer wll transt nto a new state. We assume that the state transton probablty depends on the current state and the acton taken by the peer, as peers decde ther actons based on ther currently receved resources (.e., state). Hence, gven a state s Î S at tme t, an acton a Î A of peer can lead to another state s s Î S at t ' ( t' ' > t) wth probablty C ' ' = Pa ( s, s ) Pr( s s, a ). Hence, for a state = ( s 1, ¼, s ) C of peer n C, the probablty that an acton a leads the state transton from N ' s to s can be expressed as NC ' ' = Pa s l l l l = 1 P ( s, s ) (, s ) (4) a
23 The state transton probabltes of peers are dentfed based on the hstores of past resource recprocaton. One approach that effcently bulds the state transton probablty functons s dscussed n (Park & van der Schaar, 2009) Reward Reward of a peer represents the derved utlty from ts state s. The utlty of peer can be dfferently defned dependng on the goals of applcatons. For example, n (Park & van der Schaar, 2009; Park & van der Schaar, 2009b), the reward R ( s ) for a peer n state s s the total receved resources n C, defned as R( s) = R( s1, ¼, sn ) = å r( sk) (5) where r ( s k) s a random varable that represents the receved resource n state s. If the meda k qualty s the ultmate goal of the applcaton, the utlty that corresponds to reward R ( s ) of peer n state å. Utlty functon U () kîc of peer downloadng a demanded content from ts peers at rate x s defned as ìï req 0, f x, U( x ) ï < R = í (6) ïr Q( x), otherwse ïî req where R s the mnmum rates to successfully decode the downloaded content and r s a constant representng the preference of peer for the downloadng content. The derved qualty Q ( x ) wth downloadng rate x s represented by a wdely used qualty measure, Peak Sgnal to s s U ( r( sk) ) Nose Rato (PSNR), whch s a non-decreasng and concave functon of x for multmeda applcatons (van der Schaar & Chou, 2007). Alternatvely, n (Park & van der Schaar, 2009c), the reward of a peer s defned as a guaranteed rates (and thus, guaranteed meda qualty) that can be acheved from ts assocated peers. Snce each peer n a P2P network that conssts of N total peers can ndvdually deploy the MDP, the resource recprocaton game n the network can be descrbed by a tuple (,,,,, ) where s the set of N peers, s the set of state profles of all peers,.e., = S1 SN, and = A1 AN denotes the set of acton profles. : [0,1] s a state transton probablty functon that maps from the current state profle s Î, correspondng jont acton a Î and the next state profle s Î, nto a real number between 0 and 1, and N : s a reward functon that maps an acton profle a Î and a state profle s Î nto the derved reward. Thus, we can focus on the resource recprocaton game n a group, as ths resource game can be extended to the resource recprocaton game n a P2P network. 5.3 Foresghted Resource Recprocaton Strategy The soluton to the MDP descrbed n Secton 5.2 s represented by peer 's optmal polcy p *, whch s a mappng from the states to optmal actons. The optmal polcy can be obtaned usng well-known methods such as value teraton and polcy teraton (Bertsekas, 1976). Hence, peer can decde ts actons based on the optmal polcy p *,.e., p * ( s) = a for all s Î S. Note that * polcy p enables peer to make foresghted decsons on ts resource recprocaton. C kîc
24 A conventonal approach s myopc decson makng. Myopc peers only focus on * maxmzng the mmedate expected rewards,.e., a myopc peer takes ts acton a (.e., upload bandwdth allocaton) such that the acton leads to the maxmum mmedate expected reward,.e., * () t ( t+ 1) ( t+ 1) a = arg max P s, s R s å ( ) ( ) a aîa ( t + 1) s ÎS subject to å ak L kîc. (7) Unlke the myopc peers, the foresghted peers take ther actons consderng the mmedate expected reward as well as the future rewards. Snce future rewards are generally consdered to be worth less than the rewards receved now (Watkns & Dayan, 1992), the foresghted peers try to maxmze the cumulatve dscounted expected rewards. Hence, a foresghted peer n state s at tme t c gven a dscount factor g tres to maxmze ts cumulatve dscounted expected rewards,.e., NC l l = 1 () t where Rs ( ) = å r( s ) for s rewrtten as ( t- ( t 1)) () c + t g E ér( s ù å ê ú (8) ë û t= t c + 1 maxmze ) () t s1, ¼, snc = ( ). More precsely, the expresson n (8) can be () t ( t+ 1) ( t+ 1) ( t' -( t 1)) (') ( ' 1) ( ' 1) ) c + t t + t + å Pa s (, ( s R s + å g å Pa s s R s ( t + 1) ' 2 ( t ') s ÎS t = tc + s ÎS mmedate expected reward dscounted future expected reward maxmze (, ( ) ) ) subject to å k ÎC a k L (9) The dscount factor g n the consdered P2P network can alternatvely represent the valdty of the expected future rewards, as the state transton probablty can be affected by system dynamcs such as peers jonng, swtchng, or leavng groups (Park & van der Schaar, 2009c). Hence, for example, f P2P network s n transent regme, a small value of dscount factor s desrable, whle a large value of dscount factor can be used f the P2P network s n statonary regme (de Vecana & Yang, 2003). We note that the myopc decsons are a specal case of the foresghted decsons when g = 0. Illustratve performances acheved based on dfferent resource recprocaton strateges are shown n Fgure 6. As dscussed n ths secton, resource recprocaton based on the myopc strategy s amng to maxmze the mmedate expected rewards (Eq. (8)). However, resource recprocaton based on the foresghted strategy targets on maxmzng the cumulatve (dscounted) expected rewards (Eq. (9)). Fgure 6 confrms ths, as the rewards obtaned by the actons of myopc polcy are always hgher (or equal) than the other polces for mmedate rewards (left of Fgure 6). However, a peer can acheve the hghest cumulatve dscounted expected rewards based on the foresghted polcy. Thus, the foresghted resource recprocaton strategy may be benefcal for peers, as they are generally nteractng wth each other n a long perod of tme. In (Lee et al., 2009), the foresghted resource recprocaton strateges n conjuncton wth schedulng algorthms have been deployed for meda streamng over P2P, whch shows mproved performance.
25 13 12 Immedate Expected Rewards foresghted decson myopc decson TFT decson Cumulatve Dscounted Expected Rewards ( =0.7) foresghted decson myopc decson TFT decson State Index State Index Fgure 6. Expected rewards acheved by dfferent resource recprocaton strateges 5.4 Bounded Ratonalty on Resource Recprocaton Conventonal stochastc games have been developed based on the mplct assumptons on players ratonalty, where players have the abltes to collect and process relevant nformaton, and select alternatve actons among all possble actons. However, peers are often boundedly ratonal n practce (Smon, 1955; Haruvy, 1999). Ths s because perfectly ratonal decsons are often nfeasble n practce due to memory and computatonal constrants. Due to the bounded ratonalty, peers may have ncorrect belefs on the other players behavor and lmted ablty to analyze ther envronment. Therefore, t s essental to study the mpact of the bounded ratonalty of peers on 1) the performance degradaton of the proposed resource recprocaton strategy and 2) ther repeated nteractons (resource recprocaton) for practcal mplementatons. We overvew several studes, whch nvestgate how the bounded ratonalty of peers can mpact the peers nteractons and the correspondng performances Bounded Ratonalty: Atttude towards Resource Recprocatons In (Park & van der Schaar, 2009), the bounded ratonalty s represented by the resource recprocaton atttude of peers, and ts mpact on resource recprocaton and the correspondng ndvdual peers performances s dscussed. Peers n the consdered P2P networks are characterzed based on ther atttudes towards the resource recprocaton, whch are pessmstc, neutral, or optmstc (Park & van der Schaar, 2009). These characterstcs determne how peers can respond to ther resource recprocatons. Let ( a k, s k ) be recent resource recprocaton between peer and peer k, whch s a par of peer s acton to peer k and peer k s response to peer. Peer s referred to as neutral, f t presumes that peer k lnearly changes ts response (.e. resource allocaton) correspondng to peer s next acton ( a ' k ). Peer s referred to as pessmstc f t presumes that peer k reduces ts ' resource allocaton to peer fast for a a but ncreases the resource allocaton slowly for k k ' ak ³ ak. Fnally, peer s optmstc f t presumes that peer k reduces ts resource allocaton to ' peer slowly for ak a but ncreases the resource allocaton fast for ' k ak ³ a k. Illustratve examples of these characterstcs of resource recprocaton are shown n Fgure 7.
26 L k Neutral s k Optmstc X Resource Recprocaton ( a, s ) k k Pessmstc 0 a k Fgure 7. Atttudes for resource recprocaton of boundedly ratonal peers These types of peers dscussed above obvously affect ther resource recprocaton strateges. In (Park & van der Schaar, 2009), t has been analytcally shown that f a peer has only one atttude for resource recprocaton and makes myopc decsons, t cannot effcently recprocate ts resources. Thus, t has been concluded that peers can mprove ther performance by consderng varous recprocaton atttudes and multple observatons for past resource recprocatons and makng foresghted decsons Bounded Ratonalty: Lmted Memory and Computaton Power In (Park & van der Schaar, 2009b; Park & van der Schaar, 2009c), the bounded ratonalty of peers nduced by ther lmted memory for storng the resource recprocaton hstory and lmted computaton power s dscussed. Recall that a peer s receved resources from ts assocated peers are captured by ts state. Boundedly ratonal peers can have lmted ablty to characterze ther resource recprocaton wth other peers (.e. they can dstngush ther receved resources usng only a lmted number of states). Ths s due to the large complexty requrements assocated wth ther decson makng processes. In (Park & van der Schaar, 2009b), t has been nvestgated how ths bounded ratonalty of peers can mpact the accuracy of the long-term expected rewards. It s obvous that usng more states (.e., fner states) enables each peer to compute the actual long-term rewards more accurately. However, ncreasng the number of states also leads to hgher computatonal complexty to fnd the optmal resource recprocaton strategy. Therefore, t s mportant for each peer to fnd the mnmum number of states, whle achevng a tolerable accuracy of the actual long-term rewards. In ths study, the mpact of the number of states on the accuracy of the longterm rewards s analytcally quantfed, and shows how to determne an optmal number of states that acheves the tolerable accuracy. Alternatvely, (Park & van der Schaar, 2009c) has focused on how the heterogeneous peers havng dfferent abltes to refne ther states can nteract wth each other, and the correspondng long-term rewards. Ths study analytcally shows that a peer may have multple actons that are optmal because these actons do not alter ts assocated peers states, and thus, they do not alter L
27 the resource recprocaton of these peers. Ths s because peers cannot dfferentate among all possble download rates from ther assocated peers due to the lmted number of state descrptons. It s observed that peers can mutually mprove ther long-term rewards (.e., download rates) only f they smultaneously refne ther states. It also studes the mpact of the heterogenety of peers on ther group formatons, and concludes that peers prefer to form groups wth other peers, whch not only have smlar or hgher upload rates but also have smlar abltes to refne ther state descrptons Practcal Implementaton of Foresghted Strateges The foresghted resource recprocaton strategy dscussed n Secton 5.3 has been actually mplemented n BtTorrent-lke system. The foresghted strategy replaces the TFT resource recprocaton strategy and the optmstc unchoke mechansm, whch have been mplemented n the BtTorrent protocol. By deployng the foresghted resource recprocaton strategy, the followng advantages aganst the regular BtTorrent protocol: It mproves the farness - the peers that contrbute more resources (.e., hgher upload capactes) can acheve hgher download rates. However, the peers that contrbute less resources may acheve lmted download rates It promotes cooperaton among hgh-capacty peers. It dscourages free-rdng by lmtng the upload to non-cooperatve peers. It mproves the system robustness by mnmzng the mpact of free-rdng on contrbutng peers performance. Several llustratve experment results are shown n the followng. The experments host 54 Planet-Lab nodes, 50 leechers and 4 seeds wth combned capacty of 128 KB/s servng a 100 MB fle. All peers start the download process smultaneously, whch emulate a flash crowd scenaro. The ntal seeds are stayed connected through the whole experments. A leecher dsconnects mmedately after t completes ts downloads, and reconnects mmedately whle requestng the entre fle agan. Ths enables our experments to have the same upload bandwdth dstrbuton durng the entre experment tme. Fgure 8. Download Completon Tme for Leechers Fg. 8 shows the download completon tme of leechers. The results show the clear performance dfference among hgh-capacty leechers, whch are the fastest 20% leechers, and low-capacty leechers, whch are the slowest 80% leechers. Hgh-capacty leechers can sgnfcantly mprove
28 ther download completon tme. Unlke n the regular BtTorrent system, where leechers determne ther chokng decsons based on the TFT that uses only the last recprocaton hstory, the leechers adoptng the foresghted strategy determne ther chokng decsons based on the long-term hstory. Ths enables the leechers to estmate the behavors of ther assocated peers more accurately. Moreover, snce part of the chokng decsons s randomly determned n the regular BtTorrent, there s a hgh probablty that hgh-capacty leechers need to recprocate wth the low-capacty leechers. However, the randomly determned chokng decsons are sgnfcantly reduced n the proposed approach, as the random decsons are taken only n the ntalzaton phase or n order to collect the recprocaton hstory of newly joned peers. As a result, the hghcapacty leechers ncrease the probablty to recprocate resources wth the other hgh-capacty leechers. Fgure 9. Percentage of free-rders download from contrbutng leechers When leechers adopt the foresghted strategy, they can effcently capture the selfsh behavor of the free-rders. Thus, they can unchoke the free-rders wth a sgnfcantly low probablty. Hence, the free-rders can download ther content manly from seeds not from the leechers. The results shown n Fg. 9 also confrm that the leechers n the regular BtTorrent system upload approxmately tmes more data to the free-rders compared to the leechers n the system where foresghted strategy s adopted. Ths also shows that the P2P networks consst of leechers adoptng the foresghted strategy are more robust aganst the selfsh behavors of peers than the networks operatng usng the regular BtTorrent protocol. In summary, the experment results confrm that the foresghted strategy provdes more ncentves for leechers to maxmze ther upload rate by mprovng farness, enables the leechers to dscourage non-cooperatve behavors such as free-rdng, and enhances the robustness of the network. 6. NEW DIRECTIONS FOR GAME-THEORETIC APPROACHES TO INCENTIVE DESIGN IN P2P NETWORKS
29 P2P networks are wdely used to share user-generated content such as photos, vdeos, news, and customer revews. In the case of user-generated content, peers play the roles of producers, supplers, and consumers at the same tme. Most of exstng work on ncentves n P2P networks focuses on ncentves for peers to share content that s already produced, thereby gnorng ncentves to produce content. In (Park & van der Schaar, 2010), a game theoretc formulaton s proposed to jontly analyze ncentves for peers to produce, share, and consume content n P2P networks. The nteracton among peers that are connected n a P2P network and nterested n content on the same tem s modeled as a three-stage game. In stage one (producton stage), each peer produces content, whle ts producton decson s not known to other peers. In stage two (sharng stage), each peer makes a porton of ts produced content avalable n the P2P network. In stage three (transfer and consumpton stage), peers transfer content avalable n the P2P network and consume content they have after transfer, whch s the sum of produced and downloaded content. In the one-shot non-cooperatve outcome of the content producton and sharng game, peers do not share any content at all whle producng and consumng an autarkc optmal amount. As upload ncurs costs to the uploader whle t does not beneft the uploader n the absence of an ncentve mechansm, peers do not have an ncentve to share ther content n the P2P network. On the contrary, socal optmum requres full sharng of produced content, where the optmal amount of total producton s chosen to equate the margnal beneft of producton to peers under full sharng and the margnal cost of producton and transfer. As content sharng n the P2P network reduces the overall cost of obtanng content, peers consume more content at socal optmum than at one-shot non-cooperatve equlbrum. An alternatve scenaro where the P2P network can enforce full sharng of produced content but cannot enforce the producton decsons of peers s also consdered. In such a scenaro, each peer faces a hgher effectve margnal cost of producton snce t has to upload produced content to other peers. As a result, each peer produces a smaller amount than the autarkc optmal amount, and the welfare mplcaton of enforced full sharng s ambguous. In (Park & van der Schaar, 2010), two prcng schemes are proposed to acheve socal optmum among non-cooperatve peers. A margnal product (MP) prcng scheme determnes payments to peers based on ther sharng decsons n stage two. Usng the man dea of the VCG mechansm, an MP prcng scheme provdes ncentves for users to maxmze socal welfare. A lnear prcng scheme compensates peers for ther upload and charges peers for ther download at predetermned upload and download prces, respectvely. Dependng on the system objectve, the upload and download prces can be chosen to obtan socal optmum as a non-cooperatve outcome or to maxmze the proft of the P2P network. The model of (Park & van der Schaar, 2010) offers a basc framework whch can be extended to analyze more complex stuatons. For example, a dynamc extenson of the model can be formulated to address the ncentves of peers nteractng over tme when each peer can share not only content t produced but also content t downloaded n the past. 7. CONCLUSIONS AND FUTURE CHALLENGES In ths chapter, we dscussed P2P systems that have been deployed n fle sharng and real-tme meda streamng. We overvewed varous P2P system structures and dscussed ther advantages and dsadvantages for dfferent llustratve mplementatons. Then, we nvestgated exstng P2P-
30 based fle sharng and meda streamng applcatons n detal, and dscussed the lmtatons of ther mplementatons. One of the drawbacks of the exstng mplementaton s nduced by a lack of optmal resource recprocaton strateges among self-nterested peers. Whle BtTorrent systems deploy ncentve strateges based on TFT strategy, the myopc resource recprocatons based on ths strategy provdes only a suboptmal performance. More advanced resource recprocaton strateges are dscussed, where the resource recprocaton among the nterested peers as a stochastc game, and thus, peers can make foresghted decsons on ther resource dstrbuton n a way that maxmzes ther cumulatve utltes. Ths s a desrable property of resource recprocaton strategy, as peers generally are nvolved n long-term and repeated nteractons. Fnally, we nvestgated the mpact of the bounded ratonalty of peers on ther resource recprocaton and the correspondng performance. Whle prelmnary results acheved by the foresghted resource recprocaton strateges show that they are promsng for fle sharng and meda streamng, addtonal modules that can support robust and effcent meda streamng should be desgned and developed. Then, the foresghted resource recprocaton strateges n conjuncton wth the supportng modules can ultmately mprove the meda streamng over P2P networks. Moreover, novel algorthms that can reduce the computatonal complexty requred for deployng the foresghted strateges are stll to be developed for real-tme meda streamng. KEY TERMS AND DEFINITIONS torrent (or swarm): a collecton of end hosts (or peers) partcpatng n the download of content, where content may refer to one or multple fles. tracker: a server that coordnates and asssts the peers n the swarm. leecher and seed: a peer n the leecher state s stll downloadng peces of a content, whle a peer n the seed state has a complete set of peces and s sharng them wth other peers. nterested: peer A s nterested n peer B f peer B has peces that peer A does not have and would lke to have. choked: peer A s choked by peer B f peer B decded to provde no peces to peer A resource recprocaton: resource recprocaton among peers s a set of resources that they have exchanged. ACKNOWLEDGEMENT The authors would lke to thank Mr. Ncholas Mastronarde for hs valuable comments and correctons, whch helped us to clarfy ths chapter. We also would lke to thank Dr. Jaeok Park for provdng Secton 6, whch dscussed new drectons for game-theoretc approaches to ncentve desgn n P2P networks. Fnally, ths work was supported n part by the Swss Natonal Scence Foundaton grants REFERENCES Adar, E. & Huberman, B. A. (2000). Free Rdng on Gnutella. Frst Monday 5 (10).
31 Al, S.; Mathur, A. & Zhang, H. (2006). Measurement of commercal peer-to-peer lve vdeo streamng. Workshop on Recent Advances n P2P Streamng, Waterloo, ON, Canada. Anagnostaks, K. G. & Greenwald, M. B. (2004). Exchange-based Incentve Mechansms for Peer-to-Peer Fle Sharng. Proceedng of Internatonal Conference on Dstrbuted Computng Systems, Phladelpha, PA, USA. Banerjee, S.; Bhattacharjee, B. & Kommareddy, C. (2002). Scalable applcaton layer multcast. Proceedng of ACM Specal Interest Group on Data Communcaton, Pttsburgh, PA, USA. Bertsekas, D. P. (1976), Dynamc Programmng and Stochastc Control, New York: Academc, Bharambe, A. R.; Herley, C. & Padmanabhan, V. N. (2006). Analyzng and Improvng BtTorrent Performance. Proceedngs of IEEE Conference on Computer Communcatons, Barcelona, Catalunya, Span. Buchegger, S. & Le Boudec, J.-Y. (2004). A Robust Reputaton System for P2P and Moble Adhoc Networks. Economcs of P2P Systems, Cambrdge, MA, USA. Buragohan, C.; Agrawal, D.; Sur, S. (2003). A Game Theoretc Framework for Incentves n P2P Systems. Proceedngs of IEEE Internatonal Conference on Peer-to-Peer Computng. Lnköpngs, Sweden. Castro, M.; Druschel, P.; Kermarrec, A.-M.; Nand, A.; Rowstron A. & Sngh, A. (2003). SpltStream: Hgh-bandwdth multcast n cooperatve envronments. Proceedngs of ACM Symposum on Operatng Systems Prncples, New York, USA. Chen, L.; Low, S. H. & Doyle, J. C. (2007). Contenton Control: A Game-Theoretc Approach. Proceedngs of IEEE Conference on Decson and Control, New Orleans, LA, USA. Chow, A. L.; Golubchk, L. & Msra, V. (2008). Improvng BtTorrent: A Smple Approach. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Tampa Bay, FL, USA. Chu, Y. H.; Rao, S. G. & Zhang, H. (2000). A Case for End System Multcast. Proceedngs of ACM Internatonal Conference on Measurement and Modelng of Computer Systems, Santa Clara, CA, USA. Chu, Y. H; Chuang, J. & Zhang, H. (2004). A Case for Taxaton n Peer-to-Peer Streamng Broadcast. Proceedng of ACM Specal Interest Group on Data Communcaton, Portland, OR, USA. Cohen, B. (2003). Incentves buld robustness n BtTorrent. Proceedngs of P2P Economcs Workshop, Berkeley, CA, USA. Despotovc, Z & Aberer, K. (2005). P2P reputaton management: probablstc estmaton vs. socal networks. Computer Networks, 50 (2006). Deshpande, H.; Bawa, M. & Garca-Molna, H. (2001). Streamng lve meda over peers. Techncal Report , Computer Scence Department, Stanford Unversty. Eugster, P.; Guerraou, R.; Kermarrec, A.-M. & Massoulé, L. (2004). From epdemcs to dstrbuted computng. IEEE Computer, 37(5),
32 Fan, B.; Chu, D.-M. & Lu, J. C. (2006). The Delcate Tradeoffs n BtTorrent lke Fle Sharng Protocol Desgn. Proceedngs of IEEE Internatonal Conference on Network Protocols, Santa Barbara, CA, USA. Feldman, M; La, K; Stoca, I. & Chuang, J. (2004). Robust Incentve Technques for Peer-to- Peer Networks. Proceedngs of ACM Conference on Electronc Commerce, New York, NY, USA. Fudenberg. D & Trole, J. (1991) Game Theory. Cambrdge, MA: MIT Press. Gkantsds, C; Mhal, M. & Saber, S. (2004). Random Walks n Peer-to-Peer Networks. Proceedngs of IEEE Conference on Computer Communcatons, Hong Kong. Guo, L; Chen, S.; Ren, S.; Chen, X. & Jang, S. (2004). PROP: a scalable and relable P2P asssted proxy streamng system. Proceedngs of Internatonal Conference on Dstrbuted Computng Systems, Tokyo, Japan. Gkantsds, C & Rodrguez, P. R. (2005). Network codng for large scale content dstrbuton. Proceedngs of IEEE Conference on Computer Communcatons, Mam, FL, USA. Golle, P.; Leyton-Brown, L.; Mronov, I. & Lllbrdge, M. (2001). Incentves for Sharng n Peer-to-Peer Networks. Lecture Notes n Computer Scence, 2322, Goyal V. K (2001) Multple Descrpton Codng: Compresson meets the network, IEEE Sgnal Processng Magazne, Guo, L.; Chen, S.; Xao, Z.; Tan, E.; Dng, X. & Zhang, X. (2005). Measurements, Analyss, and Modelng of BtTorrent-lke Systems. Internet Measurement Conference, Berkeley, CA, USA. Gupta, M; Judge, P. & Ammar, M. (2003). A Reputaton System for Peer-to-Peer Networks. Proceedngs of Internatonal Workshop on Network and Operatng System Support for Dgtal Audo and Vdeo, Monterey, CA, USA Haruvy, E.; Stahl, D. O. & Wlson, P. W. (1999). Evdence for optmstc and pessmstc behavor n normal-form games. Economcs Letters, 63, Heffeeda, M.; Habb, A.; Botev, B.; Xu, D. & Bhargava, B. (2003). PROMISE: Peer-to-peer meda streamng usng CollectCast. Proceedngs of ACM Multmeda, Berkeley, CA, USA. Hefeeda, M.; Bhargava, B. & Yau, D. K.-Y. (2004). A hybrd archtecture for cost-effectve ondemand meda streamng. Computer Networks, 44(3). Izal, M.; Urvoy-Keller, G.; Bersack, E. W.; Felber, P.A.; Al Hamra, A. & Garc es-erce, L. (2004). Dssectng BtTorrent: Fve Months n a Torrent s Lfetme, Passve and Actve Measurement Workshop, Antbes Juan-les-Pns, France Izhak-Ratzn, R. (2009). Collaboraton n BtTorrent systems. Networkng, 5550/2009, Izhak-Ratzn, R.; Logkas, N. & Majumdar, R. (2009). Team ncentves n BtTorrent systems. Proceedngs of Internatonal Conference on Computer Communcatons and Networks, San Francsco, CA, USA. Jaramllo, J. J & Srkant, R. (2007). DARWIN: Dstrbuted and Adaptve Reputaton mechansm for WIreless ad-hoc Networks. Proceedngs of Internatonal Conference on Moble Computng and Networkng, Montreal, Quebec, Canada.
33 Jan, K; Lovász, L. & Chou, P. A. (2007). Buldng scalable and robust peer-to-peer overlay networks for broadcastng usng network codng. Journal on Dstrbuted Computng, 19(4), Jun, S. & Ahamad, M. (2005). Incentves n BtTorrent Induce Free Rdng. Workshop on Economcs of Peer-to-Peer Systems, Phladelpha, PA, USA. Kamvar, S. D; Schlosser, M. T & Garca-Molna, H. (2003). The EgenTrust Algorthm for Reputaton Management n P2P Networks. Proceedngs of Internatonal World Wde Web Conference, Budapest, Hungary. Kostc, D.; Rodrguez, A.; Albrecht, J. & Vahdat, A (2003). Bullet: Hgh bandwdth data dssemnaton usng an overlay mesh. Proceedngs of ACM Symposum on Operatng Systems Prncple, Bolton Landn, NY, USA. La, K; Feldman, M; Stoca, I. & Chuang, J. (2003). Incentves for Cooperaton n Peer-to-Peer Networks. Workshop on Economcs of Peer-to-Peer Systems, Cambrdge, MA, USA. Legout, A.; Urvoy-Keller, G. & Mchard, P. (2006). Rarest frst and choke algorthms are enough. Internet Measurement Conference, Ro de Janero, Brazl. Lee, S. I.; Park, H. & van der Schaar, M. (2009). Foresghted Jont Resource Recprocaton and Schedulng Strateges for Real-tme Vdeo Streamng over Peer-to-Peer Networks. Internatonal Packet Vdeo Workshop, Seattle, WA, USA. Legout, A.; Logkas, A.; Kohler, E. & Zhang, L. (2007). Clusterng and sharng ncentves n BtTorrent systems. SIGMETRICS Performance Evaluaton Revew, 35(1), Levn, D.; LaCurts, K.; Sprng, N. & Bhattacharjee, B. (2008). BtTorrent s an Aucton: Analyzng and Improvng BtTorrent s Incentves. Proceedngs of ACM Specal Interest Group on Data Communcaton, Seattle, WA, USA. L, J.; Chou, P. A. & Zhang, C. (2004). Mutualcast: An Effcent Mechansm for One-To-Many Content Dstrbuton. Proceedngs of ACM Specal Interest Group on Data Communcaton, Bejng, Chna. Lang, C.; Guo, Y. & Lu, Y. (2009). Investgatng the Schedulng Senstvty of P2P Vdeo Streamng: An Expermental Study. IEEE Transactons on Multmeda, 11(3), Ln, W.S.; Zhao, H. V.; Lu, K. J. R. (2009). Incentve Cooperaton Strateges for Peer-to-Peer Lve Multmeda Streamng Socal Networks. IEEE Transactons on Multmeda, 11(3), Lan, Q.; Peng, Y.; Yang, M.; Zhang, Z.; Da, Y. & L, X. (2006). Robust ncentves va multlevel tt-for-tat. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Santa Barbara, CA, USA. Logkas, N.; Nelson, R.; Kohler, E. & Zhang, L. (2006). Explotng BtTorrent For Fun (But Not Proft). Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Santa Barbara, CA, USA. Logkas, N.; Nelson, R.; Kohler, E. & Zhang, E. (2007). In Explorng the Robustness of BtTorrent Peer-to-Peer Systems. Concurrency and Computaton: Practce and Experence, 10(2),
34 Lu, J.; L, B. & Zhang, Y.-Q. (2003). Adaptve vdeo multcast over the Internet. IEEE Multmeda, 10(1), Locher, T.; Moor, P.; Schmd, S. & Wattenhofer, R. (2006). Free Rdng n BtTorrent s Cheap. Workshop on Hot Topcs n Networks, Irvne, CA, USA. Locher, T.; Schmd, S. & Wattenhofer, R. (2007). Rescung Tt-for-Tat wth Source Codng. Internatonal Peer-to-Peer conference, Galway, Ireland. Massoulé, L. & VojnovĆ, M. (2005). Coupon replcaton systems. Proceedngs of the Internatonal Conference on Measurements and Modelng of Computer Systems, Banff, Alberta, Canada. Negla, G.; Prest, G. L.; Zhang, H. & Towsley, D. (2007). A network formaton game approach to study BtTorrent tt-for-tat. Proceedngs of Network Control and Optmzaton, Avgnon, France. Nguyen, K; Nguyen, T. & Cheung, S. -C (2007). Peer-to-Peer streamng wth herarchcal network codng. Proceedngs of IEEE Internatonal Conference on Multmeda & Expo. Bejng, Chna. Pa, V.; Kumar, K.; Tamlman, K.; Sambamurthy, V & Mohr, A. E. (2005). Chansaw: Elmnatng trees from overlay multcast. Proceedngs of Internatonal Workshop on Peer-to- Peer Systems, Ithaca, NY, USA. Park, H. & van der Schaar, M. (2007). Barganng strateges for networked multmeda resource management. IEEE Transactons on Sgnal Processng, 55(7), Park, H. & van der Schaar, M. (2009). A framework for foresghted resource recprocaton n P2P networks. IEEE Transactons on Multmeda, 11(1), Park, H. & van der Schaar, M. (2009b). On the mpact of bounded ratonalty n peer-to-peer networks. IEEE Sgnal Processng Letters, 16(8), Park, H. & van der Schaar, M. (2009c). Evoluton of resource recprocaton strateges n P2P networks. IEEE Transactons on Sgnal Processng, 58(3). Park, H. & van der Schaar, M. (2009d). Qualty-based resource brokerage for autonomous networked multmeda applcatons. IEEE Transactons on Crcuts and Systems for Vdeo Technology, 19(12), Park, J. & van der Schaar, M. (2010). Prcng and Incentves n Peer-to-Peer Networks. Proceedngs of IEEE Conference on Computer Communcatons, San Dego, CA, USA. Padmanabhan, V. N. & Srpandkulcha, K. (2002). The case for cooperatve networkng. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Cambrdge, MA, USA. Padmanabhan, V. N.; Wang H. J; Chou, P. A. &and Srpandkulcha, K. (2002b). Dstrbutng streamng meda content usng cooperatve networkng. Proceedngs of Internatonal Workshop on Network and Operatng System Support for Dgtal Audo and Vdeo, FL, USA. Padmanabhan, V. N.; Wang, H. J. & Chou, P. A. (2003). Reslent peer-to-peer streamng. Proceedngs of IEEE Internatonal Conference on Network Protocols, Atlanta, GA, USA.
35 Patek, M.; Isdal, T.; Anderson, T.; Krshnamurthy, A. & Venkataraman, A. (2007). Do ncentves buld robustness n BtTorrent? Symposum on Networked Systems Desgn and Implementaton, Cambrdge, MA, USA. Patek, M.; Isdal, T.; Krshnamurthy, A. & Anderson T. (2008). One hop reputatons for peer to peer fle sharng workloads. Symposum on Networked Systems Desgn and Implementaton, San Francsco, CA, USA. Pouwelse, J. A.; Garback, P.; Epema, D. H. J. & Sps, H. J. (2005). The BtTorrent P2P flesharng system: Measurements and Analyss. Proceedngs of Internatonal Workshop on Peer-to- Peer Systems, Ithaca, NY, USA. Qu, D. & Srkant, R. (2004). Modelng and Performance Analyss of BtTorrent-Lke Peer-to- Peer Networks. Proceedngs of ACM Specal Interest Group on Data Communcaton, Portland, OR, USA. Ratnasamy, S.; Francs, P.; Handley, M.; Karp, R. & Shenker, S. A. (2001). Scalable Content- Addressable Network. Proceedngs of ACM Specal Interest Group on Data Communcaton, San Dego, CA, USA. Rowstron, A. & Druschel, P. (2001). Pastry: Scalable, dstrbuted object locaton and routng for large scale peer to peer systems. Proceedngs of IFIP/ACM Internatonal Conference on Dstrbuted Systems Platforms (Mddleware 2001), Hedelberg, Germany. Smon, H. A. (1955). A behavoral model of ratonal choce. Quarterly Journal of Economcs 59, Sh, S. & Turner, J (2002). Routng n overlay multcast networks. Proceedngs of IEEE Conference on Computer Communcatons, New York, NY, USA. Shnedman, J.; Parkes, D. C. & Massoulé, L. (2004). Fathfulness n Internet Algorthms. Practce and Theory of Incentves and Game Theory n Networked Systems, Portland, OR, USA. Srvanos, M.; Park, J. H.; Chen, R. & Yang, X. (2007). Free-rdng n BtTorrent Networks wth the Large Vew Explot. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Bellevue, WA, USA. Stoca, I.; Morrs, R.; Karger, D.; FransKaashoek, M.; Dabek, M. & Balakrshnan, H. (2001). Chord: A Scalable Peer-To-Peer Lookup Servce for Internet Applcatons. Proceedngs of ACM Specal Interest Group on Data Communcaton, San Dego, CA, USA. Tan, R.; Zhang, Q. ; Xang, Z. ; Xong, Y. ; L, X. & Zhu, W. (2005). Robust and effcent path dversty n applcaton-layer multcast for vdeo streamng. IEEE Transactons on Crcuts and Systems for Vdeo Technology, 15(8), Tran, D. A.; Hua, K. A. & Do, T. T (2004). A Peer-to-Peer Archtecture for Meda Streamng IEEE Journal on Selected Areas n Communcatons, 22(1), Watkns, C. J. C. H. & Dayan, P. (1992). Q-learnng. Machne Learnng, 8(3-4), van der Schaar, M & Chou, P. A. (Ed.). (2007). Multmeda over IP and Wreless Networks, New York: Academc.
36 Venkataraman, V.; Francs, P. & Calandrno, J. (2006). ChunkySpread: Multtree unstructured peer-to-peer multcast. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Santa Barbara, CA, USA. Vlavanos, A.; Ilofotou, M. & Faloutsos, M (2006), BToS: Enhancng BtTorrent for supportng streamng applcatons. Proceedngs of IEEE Conference on Computer Communcatons, Barcelona, Catalunya, Span. Walsh, K & Srer, E. G (2006) Experence wth an Object Reputaton System for Peer-to- Peer Flesharng, n Proceedngs of Symposum on Networked Systems Desgn and Implementaton, San Jose, CA, USA. Xong, L. & Lu, L. (2004) PeerTrust: Supportng Reputaton-Based Trust for Peer-to-Peer Electronc Communtes, IEEE Transactons on Knowledge and Data Engneerng, 16(7), Yang, M.; Zhang, Z.; L, X. & Da, Y. (2005) An Emprcal Study of Free-Rdng Behavor n the Maze P2P Fle-Sharng System. Proceedngs of Internatonal Workshop on Peer-to-Peer Systems, Ithaca, NY, USA. Wang, M. & L, B. (2007) 2 R : Random push wth random network codng n lve peer-to-peer streamng, IEEE Journal on Selected Areas n Communcatons, 25(9), Wang, M. & L, B. (2007b) Lava: A realty check of network codng n peer-to-peer lve streamng. Proceedngs of IEEE Conference on Computer Communcatons, Anchorage, Alaska, USA. Zhang, X.; Lu, J.; L, B. & Yum, T. S. P. (2005). CoolStreamng/DONet: A data-drven overlay network for effcent lve meda streamng. Proceedngs of IEEE Conference on Computer Communcatons, Mam, FL, USA. Zhang, M.; Luo, J.-G.; Zhao, L. &Yang, S.-Q. (2005b). A peer-to-peer network for lve meda streamng usng a push-pull approach. Proceedngs of ACM Multmeda, Hlton, Sngapore. Zhang, Q; Xue, H. F. & Kou, X. D. (2007). An Evolutonary Game Model of Resources-sharng Mechansm n P2P Networks. Proceedngs of the Workshop on Intellgent Informaton Technology Applcaton, Zhang Jaje, Chna. Zhao, B. Y.; Huang, L.; Strblng, J.; Rhea, S. C.; Joseph, A.D. & Kubatowcz, J. D. (2004). Tapestry: A reslent global scale overlay for servce deployment. IEEE Journal on Selected Areas n Communcatons, 22(1), Zhuang, S. Q.; Zhao, B. Y. & Joseph, A. D. (2001). Bayeux: An archtecture for scalable and fault-tolerant wde-area data dssemnaton. Proceedngs of Internatonal Workshop on Network and Operatng System Support for Dgtal Audo and Vdeo, New York, USA.
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty [email protected], [email protected] ABSTRACT Voce over IP (VoIP) s one of
Multi-Source Video Multicast in Peer-to-Peer Networks
ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany
A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Cloud-based Social Application Deployment using Local Processing and Global Distribution
Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer
Overview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks
PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks
A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
Managing Resource and Servent Reputation in P2P Networks
Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores [email protected] Masayuk Terada NTT DoCoMo Multmeda Laboratores [email protected]
Financial Mathemetics
Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
A Cluster Based Replcaton Archtecture for Load Balancng n Peer-to-Peer Content Dstrbuton S.Ayyasamy 1 and S.N. Svanandam 2 1 Asst. Professor, Department of Informaton Technology, Tamlnadu College of Engneerng
Formulating & Solving Integer Problems Chapter 11 289
Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
A role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
Modeling Peer-Peer File Sharing Systems
Modelng Peer-Peer Fle Sharng Systems Zhu Ge, Danel R. Fgueredo, Sharad Jaswal, Jm Kurose, Don Towsley Department of Computer Scence Unversty of Massachusetts, Amherst gezhu, ratton, sharad, urose, towsley
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
The EigenTrust Algorithm for Reputation Management in P2P Networks
The EgenTrust Algorthm for Reputaton Management n P2P Networks Sepandar D. Kamvar Stanford Unversty [email protected] Maro T. Schlosser Stanford Unversty [email protected] Hector Garca-Molna
Updating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
Ad-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
Politecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Optimization of network mesh topologies and link capacities for congestion relief
Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: [email protected]
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
IWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
Optimization of File Allocation for Video Sharing Servers
Optmzaton of Fle Allocaton for Vdeo Sharng Servers Emad Mohamed Abd Elrahman Abousabea, Hossam Aff To cte ths verson: Emad Mohamed Abd Elrahman Abousabea, Hossam Aff. Optmzaton of Fle Allocaton for Vdeo
Dynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
An MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall
SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
An Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
A New Paradigm for Load Balancing in Wireless Mesh Networks
A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load
A Self-Organized, Fault-Tolerant and Scalable Replication Scheme for Cloud Storage
A Self-Organzed, Fault-Tolerant and Scalable Replcaton Scheme for Cloud Storage Ncolas Bonvn, Thanass G. Papaoannou and Karl Aberer School of Computer and Communcaton Scences École Polytechnque Fédérale
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid
Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:
A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)
Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research [email protected] [email protected] [email protected]
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
Activity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
Traffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.
Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
