skip to main content
10.1145/1073814.1073824acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding

Published:17 July 2005Publication History

ABSTRACT

We propose a scheme for building peer-to-peer overlay networks for broadcasting using network coding. The scheme addresses many practical issues such as scalability, robustness, constraints on bandwidth, and locality of decisions. We analyze the system theoretically and prove near optimal bounds on the parameters defining robustness and scalability. As a result we show that the effects of failures are contained locally, allowing the network to grow exponentially with server load. We also argue that adversarial failures are no more harmful than random failures.

References

  1. R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network information flow IEEE Trans. Information Theory, IT-46 (2000), pp. 1204--1216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Albanese, J. Blomer, J. Edmonds, M. Luby, and M. Sudan. Priority encoding transmission IEEE Trans. Information Theory, 42 (1996), pp. 1737--1744. Google ScholarGoogle ScholarCross RefCross Ref
  3. J. W. Byers, J. Considine, M. Mitzenmacher, and S. Rost. Informed content delivery across adaptive overlay networks in Proc. SIGCOMM, Pittsburgh, PA, Aug. 2002, ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh Splitstream: High-bandwidth content distribution in a cooperative environment in Proc. Int'l Workshop on Peer-to-Peer Systems, Feb. 2003.Google ScholarGoogle Scholar
  5. P. Chou, Y. Wu, and K. Jain. Practical network coding. in Proc. Allerton Conf. Communications, Control, and Computing, Monticello, IL, Oct.2003.Google ScholarGoogle Scholar
  6. Y. Chu, S. G. Rao, and H. Zhang A case for end system multicast in Joint Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Cohen Incentives build robustness in BitTorrent. http://bitconjurer.org/BitTorrent/bittorrentecon.pdf, May 2003.Google ScholarGoogle Scholar
  8. J. Edmonds. Edge-disjoint branchings in Combinatorial Algorithms, R. Rustin, ed., Academic Press, NY, 1973, pp.91--96.Google ScholarGoogle Scholar
  9. S.-Y. R. Li, R. W. Yeung, and N. Cai. Linear network coding IEEE Trans. Information Theory, IT-49 (2003), pp. 371--381. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. V. N. Padmanabhan, H. J. Wang, and P. A. Chou. Resilient peer-to-peer streaming inProc. Int'l Conf. Network Protocols, Atlanta, GA, Nov. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ______, Supporting heterogeneity and congestion control in peer-to-peer multicast streaming inProc. Int'l Workshop on Peer-to-Peer Systems, San Diego, CA, Feb. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Rejaie and S. Stafford. A framework for architecting peer-to-peer receiver-driven overlays in Proc. Int'l Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Kinsale, Ireland, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Rodriguez and C. Gkantsidis. Revolutionising content distribution. in Proc. Conf. Computer Communications (INFOCOM), Miami, FL, USA, Mar. 2005, IEEE.Google ScholarGoogle Scholar

Index Terms

  1. Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            PODC '05: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
            July 2005
            364 pages
            ISBN:1581139942
            DOI:10.1145/1073814

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 July 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate740of2,477submissions,30%

            Upcoming Conference

            PODC '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader