On maximizing tree bandwidth for topology-aware peer-to-peer streaming

被引:32
作者
Jin, Xing [1 ]
Yiu, W. -P. Ken [1 ]
Chan, S. -H. Gary [1 ]
Wang, Yajun [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Kowloon, Peoples R China
关键词
overlay tree; peer-to-peer streaming; topologyaware; tree bandwidth;
D O I
10.1109/TMM.2007.907459
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been an increasing interest in peer-to-peer (P2P) multimedia streaming. In this paper, we consider constructing a high-bandwidth overlay tree for streaming services. We observe that underlay information such as link connectivity and link bandwidth is important in tree construction, because two seemingly disjoint overlay paths may share common links on the underlay. We hence study how to construct a high-bandwidth overlay tree given the underlay topology. We formulate the problem as building a Maximum Bandwidth Multicast Tree (MBMT) or a Minimum Stress Multicast Tree (MSMT), depending on whether link bandwidth is available or not. We prove that both problems are NP-hard and are not approximable within a factor of (2/3 + epsilon), for any epsilon > 0, unless P = NP. We then present approximation algorithms to address them and analyze the algorithm performance. Furthermore, we discuss some practical issues (e.g., group dynamics, resilience and scalability) in system implementation. We evaluate our algorithms on Internet-like topologies. The results show that our algorithms can achieve high tree bandwidth and low link stress with low penalty in end-to-end delay. Measurement study based on PlanetLab further confirms this. Our study shows that the knowledge of underlay is important for constructing efficient overlay trees.
引用
收藏
页码:1580 / 1592
页数:13
相关论文
共 43 条
[21]   A proactive tree recovery mechanism for resilient overlay multicast [J].
Fei, Zongming ;
Yang, Mengkun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) :173-186
[22]  
Garey MR, 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
[23]  
Govindan R., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P1371, DOI 10.1109/INFCOM.2000.832534
[24]   Evaluation and characterization of available bandwidth probing techniques [J].
Hu, NN ;
Steenkiste, P .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (06) :879-894
[25]  
JAIN M, 2002, P ACM SIGCOMM AUG, P295
[26]  
Jannotti J, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P197
[27]  
Jin X, 2005, IEEE ICC, P1319
[28]   Network topology inference based on end-to-end measurements [J].
Jin, Xing ;
Yiu, W. -P. Ken ;
Chan, S. -H. Gary ;
Wang, Yajun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (12) :2182-2195
[29]  
Kostic D., 2003, Operating Systems Review, V37, P282, DOI 10.1145/1165389.945473
[30]  
KUROSE J., 2003, P 12 INT C WORLD WID, P301, DOI DOI 10.1145/775152.775195