Issues in Peer-to-Peer Networking: A Coding Optimization Approach

In this paper we consider a linear optimization approach for studying download finish times in peer-to-peer networks that allow but do not require coding. We demonstrate that using the network coding framework simplifies analysis even in scenarios where the optimal solution does not require coding. For example, we use the network coding framework to disprove the claim of Ezovski et al. that in the absence of coding, the sequential minimization of file download times minimizes the average finish time over all users. We also use this framework to study the effect of requiring reciprocity, a typical feature of incentive-compatible protocols. Lastly, we show that for a dynamically changing network scenario, coding can provide a robust and optimal solution that outperforms routing.

[1]  Rayadurgam Srikant,et al.  Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.

[2]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[3]  Tracey Ho,et al.  Optimal Strategies for Efficient Peer-to-Peer File Sharing , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[4]  Richard Weber,et al.  E-cient File Dissemination using Peer-to-Peer Technology , 2005 .

[5]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Bin Fan,et al.  Can Network Coding Help in P2P Networks? , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[7]  Yunnan Wu,et al.  The delay region for P2P file transfer , 2009, 2009 IEEE International Symposium on Information Theory.

[8]  Lachlan L. H. Andrew,et al.  Minimizing Average Finish Time in P2P Networks , 2009, IEEE INFOCOM 2009.

[9]  Muriel Médard,et al.  Algebraic gossip: a network coding approach to optimal multiple rumor mongering , 2006, IEEE Transactions on Information Theory.

[10]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .