Stochastic analysis of P2P file sharing systems.

Lin, Minghong. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. === Includes bibliographical references (p. 49-51). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgement --- p.v === Chapter 1 --- Introduction --- p.1 === Chapter 2 --- A Stochastic Framework --...

Full description

Bibliographic Details
Other Authors: Lin, Minghong.
Format: Others
Language:English
Chinese
Published: 2008
Subjects:
Online Access:http://library.cuhk.edu.hk/record=b5893630
http://repository.lib.cuhk.edu.hk/en/item/cuhk-326559
Description
Summary:Lin, Minghong. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. === Includes bibliographical references (p. 49-51). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgement --- p.v === Chapter 1 --- Introduction --- p.1 === Chapter 2 --- A Stochastic Framework --- p.5 === Chapter 2.1 --- Model Description --- p.5 === Chapter 2.2 --- Altruistic File Sharing System with Download Con- straint --- p.7 === Chapter 2.2.1 --- Model Formulation --- p.8 === Chapter 2.2.2 --- Steady State Analysis --- p.9 === Chapter 2.3 --- Altruistic File Sharing System with Download and Upload Constraints --- p.14 === Chapter 2.3.1 --- Model Formulation --- p.14 === Chapter 2.3.2 --- Steady State Analysis --- p.15 === Chapter 2.4 --- Incentive File Sharing via Coordinated Matching --- p.18 === Chapter 2.4.1 --- Without Incentive Mechanism --- p.18 === Chapter 2.4.2 --- With Incentive Mechanism --- p.19 === Chapter 2.5 --- Simulation --- p.23 === Chapter 3 --- An ISP-friendly Protocol --- p.28 === Chapter 3.1 --- Simple Mathematical Models --- p.28 === Chapter 3.1.1 --- Assumptions --- p.29 === Chapter 3.1.2 --- Homogeneous Case Analysis --- p.30 === Chapter 3.1.3 --- Heterogeneous Case Analysis --- p.31 === Chapter 3.1.4 --- Flash Crowd Analysis --- p.32 === Chapter 3.2 --- An ISP-friendly BitTorrent Protocol --- p.33 === Chapter 3.3 --- Performance Evaluation & Measurements --- p.36 === Chapter 3.3.1 --- Choice of the BitTorrent Client --- p.37 === Chapter 3.3.2 --- Experimental Setup --- p.37 === Chapter 3.3.3 --- Regular Peer Arrival --- p.38 === Chapter 3.3.4 --- Flash Crowd --- p.41 === Chapter 3.4 --- Black Hole Security Attack --- p.42 === Chapter 4 --- Related Work --- p.46 === Chapter 5 --- Conclusion --- p.48 === Bibliography --- p.49 === Appendix --- p.52