2006
DOI: 10.1007/s00446-006-0014-9
|View full text |Cite
|
Sign up to set email alerts
|

Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding

Abstract: We propose a scheme for building peer-topeer overlay networks for broadcasting using network coding. The scheme addresses many practical issues such as scalability, robustness, constraints on bandwidth, and locality of decisions. We analyze the system theoretically and prove near optimal bounds on the parameters defining robustness and scalability. As a result we show that the effects of failures are contained locally, allowing the network to grow exponentially with server load. We also argue that adversarial … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 15 publications
0
23
0
Order By: Relevance
“…The minimum coding distance has been defined in terms of coding redundancy at each sink as [47] d min,t = δ t + 1 (9) and can be applied in the scope of symbol-based transmission, that is, the codewords at the receiver t are vectors of symbols in F q as in (5). From the definition of coding distance follows that the number of correctable errors at the receiver t is l = (d min,t − 1)/2 , and the number of detectable errors is d min,t − 1.…”
Section: Network Error Correctionmentioning
confidence: 99%
See 1 more Smart Citation
“…The minimum coding distance has been defined in terms of coding redundancy at each sink as [47] d min,t = δ t + 1 (9) and can be applied in the scope of symbol-based transmission, that is, the codewords at the receiver t are vectors of symbols in F q as in (5). From the definition of coding distance follows that the number of correctable errors at the receiver t is l = (d min,t − 1)/2 , and the number of detectable errors is d min,t − 1.…”
Section: Network Error Correctionmentioning
confidence: 99%
“…The communication can be protected against attacks from malicious nodes [4], eavesdropping entities [5,6], and impairments such as noise and information losses [7,8] thanks to the property of the network of acting as a coding operator. In peer-to-peer networks, the distribution of a number of encoded versions of the source data avoids the well-known problem of the missing block at the end of the download [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Also in the equations, we have the convention that if there is no edge between nodes and in , the flow is zero. For any , we have (12) where is the conditional entropy of the second formulation.…”
Section: Claimmentioning
confidence: 99%
“…Under network coding based multicast, the problem of allocating resources such as rates and flows in the network can be solved in polynomial time [11]. Coding not only allows guaranteed optimal performance which is at least as good as tree-based approaches [12], but also does not suffer from the complexity issues associated with Steiner tree packings. Moreover, one can arrive at distributed solutions to these problems [11], [13].…”
Section: Introductionmentioning
confidence: 99%
“…The key idea is that, one can approach the broadcast capacity of the network by allowing intermediate nodes inside the network to code and decode the information carried by the different flows. Since then, network coding's popularity is increasing and many research papers have appeared on the subject [12,3,7,8,4]. Most of these papers focus on the multicast case where all receivers are interested in the same information.…”
Section: Introductionmentioning
confidence: 99%