IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.129
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Decentralized Broadcasting Algorithms

Abstract: We consider the problem of broadcasting a live stream of data in an unstructured network. The broadcasting problem has been studied extensively for edge-capacitated networks. We give the first proof that whenever demand λ + ε is feasible for ε > 0, a simple local-control algorithm is stable under demand λ, and as a corollary a famous theorem of Edmonds. We then study the node-capacitated case and show a similar optimality result for the complete graph. We study through simulation the delay that users must wait… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
182
0
8

Year Published

2008
2008
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 153 publications
(192 citation statements)
references
References 10 publications
2
182
0
8
Order By: Relevance
“…Consider why we have non-empty C set, that is because there are less than I nodes left unexhausted and no initial tree could be further constructed. Suppose we can reallocate the remaining bandwidth of nodes in set C to all nodes from I + 1 to N, and suppose we relax the degree constraint to tree degree bound, then we can exhaust all nodes in set C. Suppose we have supported an extra rate r e in this extra step, then clearly, the total rate we have supported is r * b + r e , and we have Plugging (25), we have proved (11).…”
Section: Discussionmentioning
confidence: 93%
See 2 more Smart Citations
“…Consider why we have non-empty C set, that is because there are less than I nodes left unexhausted and no initial tree could be further constructed. Suppose we can reallocate the remaining bandwidth of nodes in set C to all nodes from I + 1 to N, and suppose we relax the degree constraint to tree degree bound, then we can exhaust all nodes in set C. Suppose we have supported an extra rate r e in this extra step, then clearly, the total rate we have supported is r * b + r e , and we have Plugging (25), we have proved (11).…”
Section: Discussionmentioning
confidence: 93%
“…The inequality in (11) concludes that the ratio of the two critical rates is at least 1/2, and (12) comes from (11).…”
Section: B Throughput and Node Degree Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…We assume a push mechanism, in which the transmitter selects both which chunk to transmit and to which peer. Several scheduling algorithms have been proposed in the literature (see for example [9,10,11,12]), among which we selected the simplest one since our focus is on the Overlay topology optimization rather than chunk scheduling algorithm. Therefore, we adopt a simple random chunk/random peer scheduling scheme: each peer selects at random one chunk among those it has received and still stores in the trading window ( [12] employs a sliding window mechanism to optimize chunk transmission); then it selects at random one of its neighbors among those that have not yet received the selected chunk.…”
Section: Chunk Scheduling Algorithmmentioning
confidence: 99%
“…Exceptions include systems described by their authors like Coolstreaming [16] or inferred by reverse engineering like PPlive [4] and TVAnts [12]. On the academic front, there have been several attempts to try to estimate theoretical limits in terms of optimality of bandwidth utilization [3] [7] or delay [15].…”
Section: Introductionmentioning
confidence: 99%