2007 IEEE International Conference on Network Protocols 2007
DOI: 10.1109/icnp.2007.4375853
|View full text |Cite
|
Sign up to set email alerts
|

A Simple Model for Analyzing P2P Streaming Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
137
0
2

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 169 publications
(144 citation statements)
references
References 9 publications
3
137
0
2
Order By: Relevance
“…This leads to the following expression for the probability s i : Figure 2 shows graphically the Rarest First and Greedy strategies. It is well known that Greedy achieves low latency, but it is not as scalable as Rarest First [25], [23]. A mixture of these two strategies is possible, by simply dividing the buffer in two parts, from positions 1 to some index value m, 1 ≤ m ≤ N , and from m + 1 to N , and by and applying the Rarest First strategy in the first section and Greedy in the second one.…”
Section: Classical Strategies and A Mixturementioning
confidence: 99%
See 2 more Smart Citations
“…This leads to the following expression for the probability s i : Figure 2 shows graphically the Rarest First and Greedy strategies. It is well known that Greedy achieves low latency, but it is not as scalable as Rarest First [25], [23]. A mixture of these two strategies is possible, by simply dividing the buffer in two parts, from positions 1 to some index value m, 1 ≤ m ≤ N , and from m + 1 to N , and by and applying the Rarest First strategy in the first section and Greedy in the second one.…”
Section: Classical Strategies and A Mixturementioning
confidence: 99%
“…, N } into s i ∈ [0, 1] is called the selection function of the strategy. Defining the index of the initial piece of the server as 1, it is shown in [23] that:…”
Section: Simple Model For Sharing (From [23])mentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, missing chunks may be acceptable if a resilient codec is used, so optimal values are not always comparable to those in the file transfer case. Then, the buffer size, which is a parameter specific to streaming, can impact the performance (see for instance [12]). …”
Section: Introductionmentioning
confidence: 99%
“…Other work have relied on high-level models that can be evaluated via analysis and simulation [13]- [19]. While clearly important for advancing our understanding, these kinds of models or tools typically do not capture realistic network cross traffic or lower-level system issues in each peer (e.g., Fig.…”
mentioning
confidence: 99%