IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057141
|View full text |Cite
|
Sign up to set email alerts
|

A new stable peer-to-peer protocol with non-persistent peers

Abstract: Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol that guarantees stability with non-persistent peers. We propose a novel peer-to-peer protocol, the group suppressi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…We consider a model similar to [3], [12], [13] in which peers that have no chunks enter the system according to a Poisson process with a certain arrival rate. There is a seed server that has an independent Poisson clock of a fixed rate, and at each clock tick, it contacts a single peer and uploads a chunk to it following a given policy.…”
Section: B Main Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We consider a model similar to [3], [12], [13] in which peers that have no chunks enter the system according to a Poisson process with a certain arrival rate. There is a seed server that has an independent Poisson clock of a fixed rate, and at each clock tick, it contacts a single peer and uploads a chunk to it following a given policy.…”
Section: B Main Resultsmentioning
confidence: 99%
“…Also studied in [12] is a variant of this algorithm called the common chunk (CC) algorithm, which proceeds as in the RC algorithm when the peer has no chunks, then follows a policy of sampling a single peer with random selection among its required chunks until it only needs one more chunk, and then proceeds by sampling three peers and only downloading a chunk if every chunk with it appears at least twice with the sampled peers. However, although stable, these algorithms appear to have long sojourn times in some settings [13].…”
Section: A Related Work On Stable Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this protocol, only new peers who arrive with no pieces follow the rules in [1], and the peers who lack only one piece contact three peers and are allowed to download the last piece only if every piece they have is present with at least two of the three contacted peers. ‚ Bilgen and Wagner [10], [19] proposed the Group Suppression Protocol in which peers who share the same piece profile are defined as a group and the group with the largest population is defined as the largest club. The protocol states that a peer belonging to the largest club uploads only to those peers who hold greater number of pieces than it does, and refuses the upload to all other peers if it contacts them.…”
Section: A Related Workmentioning
confidence: 99%