This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Rarest-First with Probabilistic-Mode-Suppression (RFwPMS)

Nouman Khan,  Mehrdad Moharrami, and Vijay Subramanian A short version of this work appeared in IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, 2020, pp. 1153-1162.
Abstract

Recent studies suggested that the BitTorrent’s rarest-first protocol, owing to its work-conserving nature, can become unstable in the presence of non-persistent users. Consequently, for any provably stable protocol, many peers, at some point, would have to be endogenously forced to hold off their file-download activity. In this work, we propose a tunable piece-selection policy that minimizes this (undesirable) requisite by combining the (work-conserving but not stabilizing) rarest-first protocol with only an appropriate share of the (non-work conserving and stabilizing) mode-suppression protocol. We refer to this policy as “Rarest-First with Probabilistic Mode-Suppression” or simply RFwPMS. We study RFwPMS using a stochastic abstraction of the BitTorrent network that is general enough to capture a multiple swarm setting of non-persistent users – each swarm having its own altruistic preferences that may or may not overlap with those of other swarms. Using Lyapunov drift analysis, we show that for all kinds of inter-swarm behaviors and all arrival-rate configurations, RFwPMS is stable. Then, using the Kingman’s moment bound technique, we further show that the expected steady-state sojourn time of RFwPMS is independent of the arrival-rate in the single-swarm case (under a mild additional assumption). Finally, our simulation-based performance evaluation confirms our theoretical findings and shows that the steady-state expected sojourn time111The time a peer remains in the system collecting all the pieces of the file. is linear in the file-size (compared to our loose estimate of a polynomial with degree 6). Overall, an improved performance is observed in comparison to previously proposed stabilizing schemes like mode-suppression (MS).

Index Terms:
P2P File-Sharing, BitTorrent, Rarest-First, Mode-Suppression, Foster-Lyapunov Theorem, Kingman’s bound

I Introduction

Consider the task of distributing a large file to peers in an unstructured peer-to-peer (P2P) network. The file is initially available with a distinguished peer (usually termed as the seed) and each peer can initiate a transfer connection with any other peer [1].

One efficient method to perform the above task is to chop the file into a large number of small and roughly equally-sized pieces/chunks, and to allow peers to share the pieces with each other. Chopping the file allows peers to distribute parts of it before possessing it completely – this is the key idea behind the popular “BitTorrent protocol” [2]. Such an upload-while-download scheme reduces the average file-download time and more importantly, enables the network to scale its throughput with the number of peers. As a result, the BitTorrent protocol has gained large popularity over the years. Even today, despite the growth of streaming services like Netflix, Hulu, and Youtube, BitTorrent sharing remains a significant source of internet traffic [3]. In the research literature also, the protocol has gained extensive interest. For instance, on the theoretical side, various mathematical models have been recently studied [1, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17], with each model providing a high-level abstraction of the detailed workings of the actual protocol.

Two key features of BitTorrent-like networks are the tit-for-tat and optimistic-unchoke interactions among the users. Tit-for-tat, as the name indicates, are interactions where both peers share the file-contents with each other based on mutual benefit; on the other hand, opportunistic-unchoking interactions are those in which a peer altruistically offers pieces to other peers. Both these interactions are important for BitTorrent’s performance; opportunistic-unchoking helps the incoming empty-peers to get some pieces of the file whereas the tit-for-tat interactions help ward off free-riders (users who download the file but do not contribute any of it back).

A common occurrence in BitTorrent-like networks is that a peer usually spends relatively more time downloading the last few pieces of the file. This phenomenon, known as the delay-in-endgame-mode, is because the last few pieces are often the rare ones in the network. Inspired by this, Hajek and Zhu [5] studied a stochastic abstraction and showed that an unstructured222Each peer contacts another peer uniformly at random. BitTorrent-like network that employs any work-conserving333A work-conserving piece-selection policy is one in which a piece transfer always happens if the uploading peer has a piece that the downloading peer needs. piece-selection policy (e.g., Random-Novel (RN), Rarest-First (RF)) becomes unstable if the arrival rate of peers exceeds the fixed seed’s upload rate and if each peer departs immediately upon completing their own file-download.

The cause behind instability is a phenomenon called the Missing-Piece Syndrome or Last-Piece Syndrome (LPS) [5], wherein the network converges to, and then cannot escape from, the one-club scenario. In this scenario, there are a large number of peers who possess all the pieces of the file except one (such peers are called one-club peers), a very small number of peers who possess that one piece (such peers are called infected peers), and a very small number of peers that are in neither of these two groups (they are called young peers). Since a vast majority of the peers are one-club peers, owing to random peer contacts and the work-conserving piece-selection policy, all the infected peers leave the network quickly and almost all young peers (including the new-comers) join the one-club peers. Inevitably, the fixed seed is tasked with uploading that one rare piece to the entire one-club whose growth rate is larger than its upload capacity. The network thus remains trapped in this configuration and the size of the one-club grows to infinity, causing instability. This result was later substantiated with experimental checks performed by Mendes, de Souza e Silva, Menasché, Leão and Towsley [18], where it was observed that when seeds have a small effective service capacity, or when seeds are intermittent, the throughput saturates as the population size grows. Importantly, the authors also demonstrated that the last piece syndrome unfolds in a closed BitTorrent network in which each departure causes an arrival of an empty peer.

Another typical phenomenon in BitTorrent-like networks is the low availability of chunks in the start-up phase when only one user (the seed) has the complete contents of the file and the rest are empty.444Flash-crowd is a start-up phase when a large number of users enter the network and there is only a few existing users with the complete file. Reference [18] calls this scenario the first block problem.555Indeed, [18] argues that the problem of last-piece-syndrome is overestimated whereas the first-block-problem is much more critical in practice. Understandably, the duration of this phase, for any choice of piece-selection algorithm, depends on the upload capacity of the seed. However, if the incoming peers choose to leave the network immediately upon download completion, then the choice of piece-selection policy is important – to the effect that it should enforce some form of lingering instead of a blind replication to all pieces.

Finally, multiple file downloads occurring simultaneously is commonly observed in practice. This is the multi-swarm setting [7, 8] for which there isn’t as yet a piece-selection policy that guarantees stability for all arrival rates, particularly when the swarms interact with each other.

In the above discussion, we have highlighted multiple design criteria for BitTorrent-like file-sharing networks. These are:

  • Stability guarantees for all arrival-rates in both single-swarm and multi-swarm settings.

  • Improved steady-state file-delivery times.

  • Improved transient responses (e.g. low flush-out times in flash-crowds).

Our goal in this paper is to propose a flexible piece-selection policy that can attain the aforementioned design criteria. To this end, in Section I-A, we will first go through the existing work and then in I-B, list the contributions of this manuscript.

I-A Related Work

A series of recent works have appeared of which the relevant papers are [6, 4, 5, 1, 9, 10, 11, 12, 13, 7, 8].

  • Zhu and Hajek [6], in a follow-up to [5], showed that if, after completing their file-download, each peer remains in the system long enough to upload one additional piece, then the network is stable under any positive seed uploading capacity and any peer arrival rate. This demands persistence of peers, which might not hold, especially with wireless users who are sensitive to their energy and bandwidth usages. Thus, recent works have also covered piece-selection policies that ensure stability when peers are strictly non-persistent.

  • Massoulié and Vojnović [4] considered a BitTorrent-like stochastic system where before entering the system, users obtain one piece (referred to as coupon in [4]) from a central bootstrap server. Under this assumption, they showed that the performance of the network does not depend critically on either persistence of users or on load balancing piece-selection policies like RF.

  • Norros, Reittu and Eirola [1] proposed the Enforced Friedman algorithm in which a peer makes three contacts simultaneously (with replacement) and if there are ‘minority pieces’ (pieces possessed by exactly one of the three peers), then the peer downloads one of them uniformly at random. If there are no minority pieces, then the peer waits for the next triple contact. The stability of the protocol was shown for a two-chunk file-sharing system whereas for the case of a multi-chunk system, it was left as a conjecture, with numerical simulations providing good evidence of stability. In a follow-up work, Oguz, Anantharam and Norros [9] proved the stability of the Enforcement Friedman protocol for multi-chunk systems and also proposed a provably stable improvement under the name of Common Chunk protocol. In this protocol, only new peers who arrive with no pieces follow the rules in [1], and the peers who lack only one piece contact three peers and are allowed to download the last piece only if every piece they have is present with at least two of the three contacted peers.

  • Bilgen and Wagner [10, 19] proposed the Group Suppression Protocol in which peers who share the same piece profile are defined as a group and the group with the largest population is defined as the largest club. The protocol states that a peer belonging to the largest club uploads only to those peers who hold greater number of pieces than it does, and refuses the upload to all other peers if it contacts them. The protocol was proved to be stable for a two-chunk file-sharing system and its stability for multi-chunk systems was left as a conjecture.

  • Reddyvari, Parag and Shakkottai [11] took a chunk-level viewpoint and proposed the Mode-Suppression (MS) protocol. Here, the transfer of pieces in the mode (present with the most number of peers) is prohibited, except when all pieces are in the mode, and a random-novel piece not in the mode (if any) is sent. In a follow-up [12, 13], Reddyvari, Parag and Shakkottai prove the stability and scalability of Threshold Mode-Suppression (TMS) wherein pieces in the mode are prohibited from transfer when the largest-mismatch (difference between chunk-counts of the most-abundant and the rarest chunks, see 3) crosses a certain fixed threshold. This line of work showed stability and scalability for all arrival rates in the single-swarm setting.

  • Previous works have also considered bundling different swarms together in the same network and then allowing content-sharing across them. This was proposed by Zhou, Ioannidis and Massoulié [7] with the claim that such “universal swarms” can increase the stability region of a BitTorrent network. Then Zhu, Ioannidis, Hegde and Massoulié [8] formally characterized the stability region of such networks when a work-conserving piece-selection policy is used. The stability region is indeed larger than in the single-swarm setting, however, yet again, it doesn’t hold for all arrival rate configurations.

I-B Contributions

The contributions of this paper are listed below:

  1. a)

    Developing a tractable model (that extends the stochastic model from [5] and [6]) for the analysis of file-sharing P2P networks that employ tit-for-tat and optimistic-unchoke mechanisms;

  2. b)

    Demonstrating that instability occurs when a hard tit-for-tat rule is used without optimistic-unchoking. Here, instability occurs due to a first-piece syndrome (FPS) where newly arriving peers have to rely solely on the seed to get their first piece (Proposition 1);

  3. c)

    Showing that soft tit-for-tat or optimistic-unchoking mechanisms cannot ward off the last-piece-syndrome in the presence of a work-conserving piece-selection policy (Proposition 2);

  4. d)

    In a general multi-swarm setting, proposing the swarm-based RFwPMS piece-selection policy and proving its stability using a novel Lyapunov function (Theorem 1).

  5. e)

    Demonstrating the scalability of swarm-based RFwPMS in the single-swarm case, i.e., the expected steady-state sojourn time is upper-bounded by a constant which is independent of the arrival-rate of the incoming peers.666Establishing the scalability in the general multi-swarm case is left as an open problem. (Theorem 4).

  6. f)

    Showing improved performance of swarm-based RFwPMS in steady-state and flash-crowds via numerical simulations.

A preliminary version of this work was presented in [15] with a partial theoretical analysis and a sub-case of the general stochastic model studied here. The current work adds to the contributions of [15] – items a) through f) above – and provides the complete details associated with the stability analysis of swarm-based RFwPMS.

I-C Organization

Since the single-swarm model is a special case of the multi-swarm model, henceforth we only consider the multi-swarm model, except when we discuss our scalability results. The remainder of the paper is organized as follows. In Section II, we introduce the multi-swarm model which is built upon the model in [8]. Section III presents the main stability theorem along with the preliminary setup needed for the detailed proof (the detailed proof is provided in Appendix E). Section IV discusses the working of RFwPMS as well as a few types of swarm behaviors that can be relevant in specific P2P environments and follow naturally as a result of the general nature of our assumption on inter-swarm behaviors. Section VI presents few important snapshots of numerical results on stability, scalability and performance of RFwPMS. Finally, in Section VII, we give concluding remarks and few future-work directions.

I-D Notation

To aid the reading experience, we encourage the reader to refer to the relevant notation and definitions detailed in Appendix G.

II System Model

In this section, we introduce the stochastic model and describe our proposed piece-selection policy.

II-A Key Model Assumptions

A master-file, denoted by \mathcal{F}, is chopped into at least two equally-sized pieces, i.e., =[K]\mathcal{F}=[K]777For c,d={,1,0,1,}c,d\in\mathbb{Z}=\{\dotsc,-1,0,1,\dotsc\} and c<dc<d, we use the standard notation [c,d]:={c+1,,d}[c,d]:=\{c+1,\dotsc,d\} and [d][d] for [0,d][0,d] when d={1,2,}d\in\mathbb{N}=\{1,2,\dotsc\}. where K2K\geq 2. There is a distinguished peer, the seed, which holds this master-file \mathcal{F} and stays in the network indefinitely. The existence of the seed for indefinite period of time ensures that every piece is available in the network at all times, thus allowing us to study the long-term behavior of the network. We define file-WW as any non-empty subset of the master-file, thus, WW\neq\emptyset and WW\subseteq\mathcal{F}. The number of pieces in file-WW is denoted by KWK_{W}, i.e., KW=|W|K_{W}=|W|. With this definition of file, swarm-WW is defined as the set of peers who are primarily interested in downloading (pieces of) file-WW. We note that peers entering the network can be interested in any file, i.e., the files need not be disjoint subsets of \mathcal{F}. Besides their primary interest in file-WW, swarm-WW peers may also have a secondary preference for some other pieces of the master-file. Thus, the set of pieces that a swarm-WW peer can download during its stay in the network is given by W\mathcal{F}_{W} where WWW\subseteq\mathcal{F}_{W}\subseteq\mathcal{F}. It is assumed that peers enter the network according to independent Poisson processes, i.e., a swarm-WW peer enters the network according to a Poisson process of rate λW>0\lambda_{W}>0, independent of other swarms. Let 𝒲\mathcal{W} denote the set of all swarms that join the network and let 𝝀=(λW:W𝒲)\bm{\lambda}=(\lambda_{W}:W\in\mathcal{W}) denote the vector of their arrival-rates. We now list three important assumptions of the model.

  1. a)

    Empty Cache upon Arrival: Each peer maintains a cache to store the pieces it downloads. The cache is empty upon arrival and has a capacity of |W||\mathcal{F}_{W}| pieces. The part of the cache that is devoted for the pieces of secondary interest is called the excess-cache (where pieces from the set WW\mathcal{F}_{W}\setminus W are stored). In the context of [4], empty cache assumption aligns with the case when the central bootstrap server is bottlenecked, for example, in the case of a high peer arrival-rate or during a flash-crowd888A situation in which the network suddenly encounters a very large number of empty peers; this is commonly seen with torrents of popular files..

  2. b)

    Ally Swarms: While peers interested in the same file (i.e., belonging to the same swarm) exchange pieces with each other, they may or may not prefer to collaborate with peers who are interested in other files (i.e. peers belonging to a different swarm). Thus, each swarm has an associated set of ally-swarms. Formally, the ally-set of swarm-WW, denoted by 𝒲W\mathcal{W}_{W}, is a non-empty subset of 𝒲\mathcal{W} that consists of swarm-WW as well as any other swarms to which its peers can upload pieces (W𝒲W𝒲W\in\mathcal{W}_{W}\subseteq\mathcal{W}); and

  3. c)

    Strictly Non-persistent Peers: Once a peer finishes downloading their pieces of primary interest, they leave the network immediately.

II-B State Description

The notation used in this paper is a combination of related notations in [8] and [11]. We classify peers into types according to the swarm they belong to, and the set of pieces in their cache. Hence, a peer in swarm WW holding SWS\subseteq\mathcal{F}_{W} is said to be of type (W,S)(W,S). We denote the number of (W,S)(W,S)-type peers at time t0t\geq 0 by xW(S)(t)+{0,1,}x_{W}^{(S)}(t)\in\mathbb{Z}_{+}\coloneqq\{0,1,\dots\}. Then the state of the network at time tt is given by the vector

𝐱(t)(xW(S)(t):W𝒲,SW, and WS).\displaystyle\mathbf{x}(t)\coloneqq(x_{W}^{(S)}(t):W\in\mathcal{W},S\subseteq\mathcal{F}_{W},\text{ and }W\setminus S\neq\emptyset). (1)

Note that as a result of aforementioned assumptions, the cache-profile SS of a swarm-WW peer always satisfies the conditions SWS\subseteq\mathcal{F}_{W} and WSW\setminus S\neq\emptyset, with the latter condition capturing strictly non-persistent peers. For the sake of brevity, from hereon, we will omit writing these two conditions. Also, since the fixed seed is always present in the network, we do not include it in 𝐱(t)\mathbf{x}(t). The population of swarm-WW, i.e., the number of swarm-WW peers at time tt is given by

|𝐱(t)|WSxW(S)(t).\displaystyle|\mathbf{x}(t)|_{W}\coloneqq\sum_{S}x_{W}^{(S)}(t). (2)

Similarly, the total number of peers at time tt is given by

|𝐱(t)|W𝒲|𝐱(t)|W.\displaystyle|\mathbf{x}(t)|\coloneqq\sum_{W\in\mathcal{W}}|\mathbf{x}(t)|_{W}. (3)

From hereon, for brevity, we will write 𝐱(t)\mathbf{x}(t) as 𝐱\mathbf{x} since the dependence on time tt will be clear from the context.

II-C Peer-Contact Policy

Consistent with the stochastic models of [1, 4, 5, 6, 10, 11, 12, 8, 7, 9], we assume that the network employs random peer-contacts. Specifically, it is assumed that each peer has a fixed number of contact-links, denoted by L1L\geq 1. In normal peers, the first (L𝟙{Yopt=1})\left(L-\mathbbm{1}{\{Y_{opt}=1\}}\right) of these links are reserved for tit-for-tat based piece exchanges whereas the LthL^{th} link is used for optimistic-unchoking if and only if Yopt=1Y_{opt}=1; otherwise it is also used for tit-for-tat based piece exchanges. Here, YoptY_{opt} is a binary parameter that is set to 1 if optimistic-unchoking is desired as part of the peer-contact policy. In contrast to normal peers, all the LL links of the fixed seed are used for optimistic-unchokes.

For normal peers, we assume that each tit-for-tat link is activated according to an independent Poisson process of rate μ>0\mu>0 and the optimistic-unchoke link is activated according to another independent Poisson process of rate μ^>0\hat{\mu}>0. Upon activation of the link, the peer contacts, uniformly at random, some other (normal) peer from the network.999The motivation behind introducing a separate rate for the optimistic-unchoke link comes from how BitTorrent operates. In practice, by default, the number of links LL is 5, and which peer is optimistically-unchoked is rotated roughly every third tit-for-tat period (see [2]). By introducing μ\mu and μ^\hat{\mu}, this can be captured by our model by setting μ^=μ3\hat{\mu}=\frac{\mu}{3}. For more details, see [2]. For the fixed seed, each of its (optimistic-unchoke) links is activated according to a Poisson process of rate U>0U>0. We assume that the transfer of piece/s occurs instantaneously with the contact (in reality, this will take more time than initiating a contact).

To define the tit-for-tat and optimistic-unchoking mechanisms, let us imagine a contact in which a peer, say peer-(1), which is of type (W1,S1)(W_{1},S_{1}), has contacted another peer, say peer-(2), which is of type (W2,S2)(W_{2},S_{2}). The interaction between the two peers depends on the type of contact that peer-(1) has made with peer-(2). Thus, there are two cases.

  1. a)

    Tit-for-Tat Contact: In this case, both peers first check the swarm-identity of each other following which they reveal their cache-profiles (based on how they view each other’s swarm). Specifically, for each k=1,2k=1,2, the following events happen sequentially.

    1. i)

      Peer-(k)(k) shares its swarm-identity WkW_{k} with peer-(k-k).101010Here, k-k denotes the element in {1,2}{k}\{1,2\}\setminus\{k\}.

    2. ii)

      If Wk𝒲WkW_{-k}\notin\mathcal{W}_{W_{k}}, Peer-(k)(k) reveals an empty cache-profile, S^k=\widehat{S}_{k}=\emptyset111111This ensures that no piece is transferred to a non-ally peer., otherwise it shows its true cache-profile, S^k=Sk\widehat{S}_{k}=S_{k}. We call S^k()\widehat{S}_{k}(\cdot) the revealed cache-profile of peer-(k)(k).

    3. iii)

      Peer-(k)(k) checks if the contact is potentially useful, i.e., if (S^kWk)Sk(\widehat{S}_{-k}\cap W_{k})\setminus S_{k} is non-empty. 121212Checking (S^kWk)Sk(\widehat{S}_{-k}\cap W_{k})\setminus S_{k} instead of (S^kWk)Sk(\widehat{S}_{-k}\cap\mathcal{F}_{W_{k}})\setminus S_{k} matches with our assumption that extra pieces (in WW\mathcal{F}_{W}\setminus W) are given secondary preference. If (S^kWk)Sk(\widehat{S}_{-k}\cap W_{k})\setminus S_{k} is non-empty, peer-(k)(k) commits to transfer some piece to peer-(k)(-k) from S^k\widehat{S}_{k}. If (S^kWk)Sk(\widehat{S}_{-k}\cap W_{k})\setminus S_{k} is empty, the network forces peer-(k)(k) to conduct a Bernoulli(pp) trial, only upon the success of which, it must commit to transfer some piece to peer-(k)(-k) from S^k\widehat{S}_{k}. Once peer-(k)(k) has committed to transfer a piece to peer-(k)(-k) from S^k\widehat{S}_{k}, we say that “peer-(k)(k) has push-contacted peer-(k)(-k) under revealed cache-profile S^k\widehat{S}_{k}” or equivalently “peer-(k)(-k) has pull-contacted peer-(k)(k) with revealed cache-profile S^k\widehat{S}_{k}”. Here, importantly, we note that the probability of this push-contact is at least pp.

  2. b)

    Optimistic Unchoke: In this case, peer-(1)(1) checks the swarm-identity W2W_{2} and then push-contacts peer-(2)(2) with revealed cache-profile S^1(W2)\widehat{S}_{1}(W_{2}).

From a) and b), it is clear that no piece is transferred from peer-(k)(k) to peer-(k)(-k) if Wk𝒲WkW_{-k}\notin\mathcal{W}_{W_{k}} (k=1,2k=1,2). Hence, we need not consider push-contacts from a peer to its non-ally peer. Once a push-contact has been made, which exact piece is chosen for transfer and whether the transfer is successful or not, is determined by the network’s piece-selection policy. This is described next.

II-D Piece-Selection Policy (Swarm-based RFwPMS)

Suppose that at time t0t\geq 0, a (V,T)(V,T)-peer has push-contacted its ally-peer, say a (W,S)(W,S)-peer (W𝒲VW\in\mathcal{W}_{V}), with revealed cache-profile T^\widehat{T}. To describe Swarm-based RFwPMS, some definitions (a’la [11, 12, 13]) are needed.

Definition 1

The frequency of piece ii in swarm-WW’s population is denoted by πW(i)(𝐱)\pi^{(i)}_{W}(\mathbf{x}) and is defined as follows:

πW(i)(𝐱){1|𝐱|WS:iSxW(S)(t)if |𝐱|W>0,0if |𝐱|W=0.\displaystyle\pi^{(i)}_{W}(\mathbf{x})\coloneqq\begin{cases}\frac{1}{|\mathbf{x}|_{W}}\sum\limits_{S:i\in S}x_{W}^{(S)}(t)&\text{if $|\mathbf{x}|_{W}>0$},\\ 0&\text{if $|\mathbf{x}|_{W}=0$}.\end{cases} (4)

The chunk-count of piece ii in swarm-WW is then given by cW(i)(𝐱)=πW(i)(𝐱)|𝐱|Wc^{(i)}_{W}(\mathbf{x})=\pi^{(i)}_{W}(\mathbf{x})|\mathbf{x}|_{W}. The maximum and minimum chunk frequencies in swarm-WW are denoted by π¯W(𝐱)\overline{\pi}_{W}(\mathbf{x}) and π¯W(𝐱)\underline{\pi}_{W}(\mathbf{x}) respectively,

π¯W(𝐱)maxiWπW(i)(𝐱) and π¯W(𝐱)miniWπW(i)(𝐱).\displaystyle\overline{\pi}_{W}(\mathbf{x})\coloneqq\max\limits_{i\in W}\pi_{W}^{(i)}(\mathbf{x})\hskip 5.0pt\text{ and }\hskip 5.0pt\underline{\pi}_{W}(\mathbf{x})\coloneqq\min\limits_{i\in W}\pi_{W}^{(i)}(\mathbf{x}). (5)

Similar definitions hold for maximum and minimum chunk-counts of swarm-WW, denoted respectively by c¯W(𝐱)\overline{c}_{W}(\mathbf{x}) and c¯W(𝐱)\underline{c}_{W}(\mathbf{x}), that is,

c¯W(𝐱)π¯W(𝐱)|𝐱|W and c¯W(𝐱)π¯W(𝐱)|𝐱|W.\displaystyle\overline{c}_{W}(\mathbf{x})\coloneqq\overline{\pi}_{W}(\mathbf{x})|\mathbf{x}|_{W}\hskip 5.0pt\text{ and }\hskip 5.0pt\underline{c}_{W}(\mathbf{x})\coloneqq\underline{\pi}_{W}(\mathbf{x})|\mathbf{x}|_{W}. (6)

Importantly, both are computed over the file of primary interest, WW, instead of the complete set of downloadable pieces, W\mathcal{F}_{W}.

Definition 2

The total chunk-count in swarm-WW is given by

PW(𝐱)iWcW(i)(𝐱).\displaystyle P_{W}(\mathbf{x})\coloneqq\sum\limits_{i\in W}c^{(i)}_{W}(\mathbf{x}). (7)
Definition 3

The mismatch of piece ii in swarm-WW is given by

mW(i)(𝐱)c¯W(𝐱)cW(i)(𝐱).\displaystyle m^{(i)}_{W}(\mathbf{x})\coloneqq\overline{c}_{W}(\mathbf{x})-c^{(i)}_{W}(\mathbf{x}). (8)

Importantly, we shall be interested in the largest-mismatch

m¯W(𝐱)(c¯Wc¯W)(𝐱),\displaystyle\overline{m}_{W}(\mathbf{x})\coloneqq(\overline{c}_{W}-\underline{c}_{W})(\mathbf{x}), (9)

and the total-mismatch

MW(𝐱)iWmW(i)(𝐱).\displaystyle M_{W}(\mathbf{x})\coloneqq\sum_{i\in W}m_{W}^{(i)}(\mathbf{x}). (10)

Here, we note that

m¯W(𝐱)MW(𝐱)(KW1)m¯W(𝐱).\displaystyle\overline{m}_{W}(\mathbf{x})\leq M_{W}(\mathbf{x})\leq(K_{W}-1)\overline{m}_{W}(\mathbf{x}). (11)
Definition 4

For a swarm-WW, the complementary chunk-count of piece ii, denoted by dW(i)(𝐱)d^{(i)}_{W}(\mathbf{x}), is its number of copies in the ally-swarms of swarm-WW. That is,

dW(i)(𝐱)VWW𝒲VcV(i)(𝐱).\displaystyle d^{(i)}_{W}(\mathbf{x})\coloneqq\sum\limits_{\begin{subarray}{c}V\neq W\\ W\in\mathcal{W}_{V}\end{subarray}}c^{(i)}_{V}(\mathbf{x}). (12)
Definition 5

The set of rare pieces in swarm-WW, denoted by RW(𝐱)R_{W}(\mathbf{x}), is defined as follows:

RW(𝐱){{iW:cW(i)(𝐱)<c¯W(𝐱)}if c¯W(𝐱)c¯W(𝐱),Wif c¯W(𝐱)=c¯W(𝐱).\displaystyle R_{W}(\mathbf{x})\coloneqq\begin{cases}\{i\in W:c^{(i)}_{W}(\mathbf{x})<\overline{c}_{W}(\mathbf{x})\}&\text{if $\overline{c}_{W}(\mathbf{x})\neq\underline{c}_{W}(\mathbf{x})$},\\ W&\text{if $\overline{c}_{W}(\mathbf{x})=\underline{c}_{W}(\mathbf{x})$}.\end{cases} (13)
Definition 6

The set of non-rare pieces in swarm-WW is given by RWc(𝐱)WRW(𝐱){R}^{c}_{W}(\mathbf{x})\coloneqq W\setminus R_{W}(\mathbf{x}).

Definition 7

The set of extra pieces for swarm-WW is given by WW\mathcal{F}_{W}\setminus W.

Unless otherwise noted, we will refer to a rare-piece by rr, a non-rare piece by nn, and importantly many times, the rarest piece (one with the lowest chunk-count) by r¯\underline{r}. We now list the rules of swarm-based RFwPMS for a possible piece transfer from the (V,T)(V,T)-peer to (its ally) (W,S)(W,S)-peer, when (V,T)(V,T)-peer reveals cache-profile T^\widehat{T}:

  1. a)

    Download of a Rare Piece: If a rare-piece is available for transfer, i.e., (T^RW(𝐱))S\left(\widehat{T}\cap R_{W}(\mathbf{x})\right)\setminus S\neq\emptyset, then the (V,T)(V,T)-peer uploads the rarest piece it can offer, i.e., a piece chosen uniformly at random from the set

    R¯(T^,W,S)(𝐱)argminj(T^RW(𝐱))ScW(j)(𝐱).\displaystyle\underline{R}_{(\widehat{T},W,S)}(\mathbf{x})\coloneqq\operatorname*{arg\,min}\limits_{j\in\left(\widehat{T}\cap R_{W}(\mathbf{x})\right)\setminus S}c^{(j)}_{W}(\mathbf{x}). (14)
  2. b)

    Download of a Non-rare Piece: In the case that no rare piece is available for transfer but a non-rare piece is, i.e., (T^RW(𝐱))S=\left(\widehat{T}\cap R_{W}(\mathbf{x})\right)\setminus S=\emptyset and (T^W)S(\widehat{T}\cap W)\setminus S\neq\emptyset, then the (V,T)(V,T)-peer chooses some non-rare piece n(T^W)Sn\in(\widehat{T}\cap W)\setminus S uniformly at random, and uploads it only if the result of a Bernoulli(ζW(n)(𝐱))\left(\zeta_{W}^{(n)}(\mathbf{x})\right) trial is a success. We refer to ζW(n)(𝐱)\zeta_{W}^{(n)}(\mathbf{x}) as the non-rares’ sharing factor and it is defined as follows.

    ζW(n)(𝐱){exp((m¯W(𝐱)+(dW(n)(𝐱))αW)βWKW)if βW>0,0if βW=0.\displaystyle\zeta_{W}^{(n)}(\mathbf{x})\coloneqq\begin{cases}\exp\left(-\frac{\left(\overline{m}_{W}(\mathbf{x})+\left(d^{(n)}_{W}(\mathbf{x})\right)^{\alpha_{W}}\right)}{\beta_{W}K_{W}}\right)&\text{if $\beta_{W}>0$},\\ 0&\text{if $\beta_{W}=0$}.\end{cases} (15)

    Here, βW0,αW(0,1]\beta_{W}\geq 0,\alpha_{W}\in(0,1] are tuning parameters. (As an aside, note that complete mode-suppression is covered as we allow βW=0\beta_{W}=0).

    Intuition: Let us develop some intuition about our specific choice of ζW(n)(𝐱)\zeta_{W}^{(n)}(\mathbf{x}). As indicated earlier in Section I, the mode-suppression (MS) protocol [12] strictly forbids the replication of non-rare pieces. This does a good job of maintaining a uniform chunk-distribution throughout the network’s evolution. However, there is an accompanying undesirable effect – no piece is transferred in all those push-contacts wherein only the non-rare pieces are available for transfer. As shown in Section VI, this can incur a high penalty on the file-delivery time during a flash-crowd.131313A situation in which the network suddenly encounters a very large number of empty peers; this is commonly seen with torrents of popular files. Besides flash-crowds, even under normal operating conditions, completely suppressing non-rare pieces is unnecessary and, as indicated in [12], a trade-off exists between their suppression and sharing. Swarm-based RFwPMS allows for tuning this trade-off via ζW(n)\zeta_{W}^{(n)}.

    Even though different swarms are coupled together in the same system, one can optimistically expect that if each swarm tries to uniformly maintain its own chunk-distribution, the stochastic system should hopefully converge to some form of equilibrium (after possibly some temporary transient behavior due to the effects of other swarms). Keeping this in mind, the first term of ζW(n)\zeta_{W}^{(n)}, i.e.,

    exp(m¯W(𝐱)βWKW),\exp\left(-\frac{\overline{m}_{W}(\mathbf{x})}{\beta_{W}K_{W}}\right),

    is intended to increase the probabilistic-suppression of non-rare pieces as the total-mismatch becomes larger. (We use m¯W\overline{m}_{W} as a simple proxy for MWM_{W}).

    Ideally, we would have liked ζW(n)\zeta_{W}^{(n)} to consist of the first term only. But showing stability of our multi-swarm model in that case is hard. The key technical difficulty behind this is the form of the Lyapunov function that we have engineered (see (26), (27)), and our analysis of the unit-transition drift (where we are effectively trying to decouple the inter-swarm effects). There, if we consider states with large m¯W\overline{m}_{W} and a large complementary chunk-count dW(n)d^{(n)}_{W}, then the suppression through exp(m¯W(𝐱)βWKW)\exp\left(-\frac{\overline{m}_{W}(\mathbf{x})}{\beta_{W}K_{W}}\right) turns out to be insufficient to satisfy the unit-transition drift conditions. (The term exp(m¯W(𝐱)βWKW)\exp\left(-\frac{\overline{m}_{W}(\mathbf{x})}{\beta_{W}K_{W}}\right) cannot shrink a polynomial term in dW(n)d^{(n)}_{W}). All is not lost however, as we circumvent this technical issue, by introducing the second suppression term

    exp((dW(n)(𝐱))αWβWKW),\exp\left(-\frac{\left(d^{(n)}_{W}(\mathbf{x})\right)^{\alpha_{W}}}{\beta_{W}K_{W}}\right),

    where by choosing αW(0,1]\alpha_{W}\in(0,1] sufficiently small, ζWn(𝐱)\zeta_{W}^{n}(\mathbf{x}) effectively becomes a function of the ratio of swarm-WW’s total-mismatch to its file-size KWK_{W}. The higher this ratio, the lesser the likelihood that the (non-rare) piece nn gets replicated. The choice of the ratio instead of just the total-mismatch matches the intuition that a file with large number of pieces should allow more sharing of non-rare pieces as opposed to a file with smaller number of pieces.

  3. c)

    Download of an Extra Piece: If, from rules (b) and (c), no piece of file-WW could be uploaded to the (W,S)(W,S)-peer, then the (V,T)(V,T)-peer uploads an extra piece chosen uniformly at random from the set (T^W)(SW)(\widehat{T}\cap\mathcal{F}_{W})\setminus(S\cup W).

With the above three rules, the transferable-set A(𝐱,T^,W,S)A(\mathbf{x},\widehat{T},W,S) for swarm-based RFwPMS can be computed according to Algorithm 1. By transferable set, we mean the set of pieces chosen for transfer by the piece-selection policy – in our case, the transferable set will either be empty or a singleton set.

Algorithm 1 Transferable-set of swarm-based RFwPMS.
0:  𝐱,W,S,T^\mathbf{x},W,S,\widehat{T}.
0:  Transferable-set, A(𝐱,T^,W,S)A(\mathbf{x},\widehat{T},W,S).
1:  Set AA\leftarrow\emptyset.
2:  Set H1(T^RW(𝐱))SH_{1}\leftarrow\left(\widehat{T}\cap R_{W}(\mathbf{x})\right)\setminus S.
3:  Set H2(T^W)SH_{2}\leftarrow\left(\widehat{T}\cap W\right)\setminus S.
4:  Set H3(T^W)(SW)H_{3}\leftarrow\left(\widehat{T}\cap\mathcal{F}_{W}\right)\setminus\left(S\cup W\right).
5:  if H1H_{1}\neq\emptyset then
6:     Choose rr randomly from R¯(T^,W,S)\underline{R}_{(\widehat{T},W,S)}.
7:     Set AA{r}A\rightarrow A\cup\{r\}.
8:  else if H2H_{2}\neq\emptyset then
9:     Choose nn randomly from (T^W)S\left(\widehat{T}\cap W\right)\setminus S.
10:     Conduct Bernoulli trial with success probability ζW(n)\zeta_{W}^{(n)}.
11:     if Success then
12:        Set AA{n}A\leftarrow A\cup\{n\}.
13:     else
14:        if H3H_{3}\neq\emptyset then
15:           Choose ee randomly from H3H_{3}.
16:           Set AA{e}A\leftarrow A\cup\{e\}.
17:        end if
18:     end if
19:  else
20:     if H3H_{3}\neq\emptyset then
21:        Choose ee randomly from H3H_{3}.
22:        Set AA{e}A\leftarrow A\cup\{e\}.
23:     end if
24:  end if
25:  return  AA.

In order to extend our rules to the seed, we assume that the seed is a (,)(\dagger,\mathcal{F})-type peer141414For example, \dagger can be {K+1}\mathcal{F}\cup\{K+1\}. with the ally-set 𝒲=𝒲\mathcal{W}_{\dagger}=\mathcal{W}. Thus, the set of rare pieces when the seed push-contacts a normal peer is given by

R¯(,W,S)(𝐱)=argminjRW(𝐱)ScW(j)(𝐱).\displaystyle\underline{R}_{(\mathcal{F},W,S)}(\mathbf{x})=\operatorname*{arg\,min}\limits_{j\in R_{W}(\mathbf{x})\setminus S}c^{(j)}_{W}(\mathbf{x}).

Remark: Note that when there is no rare piece at offer, a non-rare piece n(TW)Sn\in(T\cap W)\setminus S is transferred only probabilistically, so swarm-based RFwPMS is not a work-conserving scheme.

Remark: With rules a), b) and c), we note that each swarm maintains its own chunk-table and also prioritizes its primary pieces over other pieces of the master-file. For these two reasons, we call our policy, “swarm-based” RFwPMS.

II-E Process Description / Suitable Bounds on Transition Rates

For the sake of notational simplicity, from hereon, we will write function f()f(\cdot) as ff when the dependence on the argument is clear. At any given current state 𝐱\mathbf{x}, the next state of the network depends solely on 𝐱\mathbf{x} because the piece-selection policy solely depends on 𝐱\mathbf{x} and the new arrivals (empty peers) are determined by an independent Poisson process. Hence, the evolution of the network described by the process {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} is a continuous-time, time-homogeneous, and irreducible (easily shown) Markov chain with state space,

𝒮+W𝒲|{S:SW and WS}|.\displaystyle\mathcal{S}\coloneqq\mathbb{Z}_{+}^{\sum\limits_{W\in\mathcal{W}}\left|\left\{S:S\subseteq\mathcal{F}_{W}\text{ and }W\setminus S\neq\emptyset\right\}\right|}. (16)

Given a state 𝐱\mathbf{x}, there are different events that can lead to state-transitions, namely, the arrival of a new empty peer, the download of a single-piece or a (two-sided) piece-exchange (download of two pieces simultaneously as a result of some tit-for-tat contact). Here, we do not list the transition rates of (two-sided) piece-exchanges: later in Section III, we will see that with our choice of Lyapunov function, such transitions can be viewed as two separate single-piece-download events. The result of each event is given below.

  1. a)

    Arrival of an Empty-peer: Recall that a swarm-WW peer with an empty cache enters the network according to a Poisson process of rate λW\lambda_{W}. This results in a unit increase in the number of swarm-WW peers with no pieces. Let us denote this transition by {(,+)W}\{(\emptyset,+)_{W}\} and its corresponding rate by qW(+)q_{W}^{(\emptyset+)}. Then

    qW(+)=λW.\displaystyle q_{W}^{(\emptyset+)}=\lambda_{W}. (17)
  2. b)

    Download of Piece of Primary Interest: Consider the event that a (W,S)(W,S)-peer missing piece iWi\in W downloads piece ii. The necessary condition for this event is that (W,S)(W,S)-peer gets push-contacted by a (V,T)(V,T)-peer such that W𝒲VW\in\mathcal{W}_{V} and iTi\in T. There are three distinct ways in which this can happen.

    1. i)

      The (W,S)(W,S)-peer gets push-contacted by the (V,T)(V,T) peer as a result of a tit-for-tat contact initiated by the (V,T)(V,T)-peer. By the superposition and thinning properties of Poisson processes, the rate at which an ally peer of swarm WW with piece ii makes a tit-for-tat contact with a (W,S)(W,S)-peer is

      (μV:W𝒲V,T:iTxV(T))(L𝟙{Yopt=1})xW(S)|𝐱||𝐱||𝐱|1.\displaystyle\left(\mu\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:i\in T\end{subarray}}x_{V}^{(T)}\right)\cdot(L-\mathbbm{1}{\{Y_{opt}=1\}})\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{|\mathbf{x}|}{|\mathbf{x}|-1}.
    2. ii)

      The (W,S)(W,S)-peer gets push-contacted by the (V,T)(V,T)-peer as a result of an optimistic-unchoke (initiated by the (V,T)(V,T)-peer). The rate at which a (W,S)(W,S)-peer gets contacted in an optimistic-unchoke by an ally-peer having piece ii is given by

      ULxW(S)|𝐱|+(𝟙{Yopt=1}μ^V:W𝒲V,T:iTxV(T))\displaystyle UL\cdot\frac{x_{W}^{(S)}}{|\mathbf{x}|}+\left(\mathbbm{1}{\{Y_{opt}=1\}}\hat{\mu}\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:i\in T\end{subarray}}x_{V}^{(T)}\right)
      ×xW(S)|𝐱||𝐱||𝐱|1.\displaystyle\hskip 120.0pt\times\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{|\mathbf{x}|}{|\mathbf{x}|-1}.
    3. iii)

      The (W,S)(W,S)-peer gets push-contacted by the (V,T)(V,T)-peer as a result of a tit-for-tat contact initiated by the (W,S)(W,S)-peer. The rate at which a (W,S)(W,S)-peer makes a tit-for-tat contact with an ally-peer that has piece ii is

      (μxW(S))(L𝟙{Yopt=1})V:W𝒲V,T:iTxV(T)|𝐱||𝐱||𝐱|1.\displaystyle\left(\mu x_{W}^{(S)}\right)\cdot(L-\mathbbm{1}{\{Y_{opt}=1\}})\frac{\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:i\in T\end{subarray}}x_{V}^{(T)}}{|\mathbf{x}|}\frac{|\mathbf{x}|}{|\mathbf{x}|-1}.

    Let us denote by ΓW(i)=ΓW(i)(𝐱)\Gamma_{W}^{(i)}=\Gamma_{W}^{(i)}(\mathbf{x}) the aggregate rate at which an ally peer of swarm-WW with piece ii push-contacts some other peer in the network. The exact form of ΓW(i)\Gamma_{W}^{(i)} is complicated, however, from i), ii), iii) and our descriptions of tit-for-tat and optimistic-unchoke, we can bound it both from above and below. Let

    Γ¯W(i)(𝐱)\displaystyle\underline{\Gamma}_{W}^{(i)}(\mathbf{x}) LU+Δpξ1(cW(i)+dW(i))\displaystyle\coloneqq LU+\Delta_{p}\xi_{1}\left(c^{(i)}_{W}+d^{(i)}_{W}\right)
    LU+ΔpcW(i).\displaystyle\geq LU+\Delta_{p}c^{(i)}_{W}. (18)

    and

    Γ¯W(i)(𝐱)\displaystyle\overline{\Gamma}_{W}^{(i)}(\mathbf{x}) LU+Δ1ξ1(cW(i)+dW(i))\displaystyle\coloneqq LU+\Delta_{1}\xi_{1}\left(c^{(i)}_{W}+d^{(i)}_{W}\right)
    LU+2Δ1(cW(i)+dW(i)),\displaystyle\leq LU+2\Delta_{1}\left(c^{(i)}_{W}+d^{(i)}_{W}\right), (19)

    where, for brevity, we have introduced ξ1ξ1(𝐱)=|𝐱||𝐱|1(1,2]\xi_{1}\coloneqq\xi_{1}(\mathbf{x})=\frac{|\mathbf{x}|}{|\mathbf{x}|-1}\in(1,2] (for all |𝐱|2|\mathbf{x}|\geq 2), and Δt2(L𝟙{Yopt=1})μt+𝟙{Yopt=1}μ^\Delta_{t}\coloneqq 2(L-\mathbbm{1}{\{Y_{opt}=1\}})\mu t+\mathbbm{1}{\{Y_{opt}=1\}}\hat{\mu}. It is clear that

    Γ¯W(i)ΓW(i)Γ¯W(i).\displaystyle\underline{\Gamma}^{(i)}_{W}\leq\Gamma^{(i)}_{W}\leq\overline{\Gamma}^{(i)}_{W}. (20)

    and

    Γ¯W(i)Γ¯W(i)\displaystyle\frac{\overline{\Gamma}_{W}^{(i)}}{\underline{\Gamma}_{W}^{(i)}} =LU+Δ1ξ1(cW(i)+dW(i))LU+Δpξ1(cW(i)+dW(i))\displaystyle=\frac{LU+\Delta_{1}\xi_{1}\left(c^{(i)}_{W}+d^{(i)}_{W}\right)}{LU+\Delta_{p}\xi_{1}\left(c^{(i)}_{W}+d^{(i)}_{W}\right)}
    ξ2{1+2(L1)μ+μ^2(L1)μp+μ^if Yopt=1,1+1pif Yopt=0.\displaystyle\leq\xi_{2}\coloneqq\begin{cases}1+\frac{2(L-1)\mu+\hat{\mu}}{2(L-1)\mu p+\hat{\mu}}&\text{if $Y_{opt}=1$,}\\ 1+\frac{1}{p}&\text{if $Y_{opt}=0$.}\\ \end{cases} (21)

    Here, ξ2=ξ2(Yopt,L,p,μ,μ^)\xi_{2}=\xi_{2}(Y_{opt},L,p,\mu,\hat{\mu}) is a constant that depends on the model parameters.

    After the (W,S)(W,S)-peer has downloaded piece ii, depending on SS, it will either remain in the network or leave it immediately. Therefore, we have two cases:

    1. i)

      if WS{i}W\setminus S\supsetneq\{i\}, the peer stays in the system. Let us denote this transition by {(S,i+)W}\{(S,i+)_{W}\} and the corresponding rate by qW(S,i+)q_{W}^{(S,i+)}. Based on the description of swarm-based RFwPMS, qW(S,i+)q_{W}^{(S,i+)} depends on whether iRWi\in R_{W} or iRWci\in R^{c}_{W}. If i=ri=r is some rare piece in RWR_{W}, then we have

      xW(S)|𝐱|Γ¯W(r)ξ2xW(S)|𝐱|Γ¯W(r)qW(S,r+)\displaystyle\frac{x_{W}^{(S)}}{|\mathbf{x}|}\underline{\Gamma}_{W}^{(r)}\xi_{2}\geq\frac{x_{W}^{(S)}}{|\mathbf{x}|}\overline{\Gamma}_{W}^{(r)}\geq q_{W}^{(S,r+)}\geq\dots
      xW(S)|𝐱|[LU𝟙{rR¯(,W,S)}|R¯(,W,S)|\displaystyle\hskip 10.0pt\geq\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU\mathbbm{1}{\{r\in\underline{R}_{(\mathcal{F},W,S)}\}}}{|\underline{R}_{(\mathcal{F},W,S)}|}\right.
      +Δpξ1V:W𝒲V,T:rT𝟙{rR¯(T,W,S)}|R¯(T,W,S)|xV(T)],\displaystyle\hskip 10.0pt\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{\mathbbm{1}{\{r\in\underline{R}_{(T,W,S)}\}}}{|\underline{R}_{(T,W,S)}|}x_{V}^{(T)}\right], (22)

      where the two indicator terms ensure that piece rr is transferred only if it is the rarest of all the available rare pieces. Importantly, when the chunk-distribution in swarm-WW is uniform i.e., c¯W=c¯W\overline{c}_{W}=\underline{c}_{W}, by definition, RW=WR_{W}=W and the above expression assumes a more tractable form. Therefore, for each swarm-WW, we partition the state space into two regions, namely 𝒮W1\mathcal{S}^{1}_{W} and 𝒮W2\mathcal{S}^{2}_{W}, where 𝒮W1={𝐱𝒮:RW(𝐱)W}\mathcal{S}^{1}_{W}=\{\mathbf{x}\in\mathcal{S}:R_{W}(\mathbf{x})\subsetneq W\}, and 𝒮W2={𝐱𝒮:RW(𝐱)=W}\mathcal{S}^{2}_{W}=\{\mathbf{x}\in\mathcal{S}:R_{W}(\mathbf{x})=W\}.151515When 𝐱𝒮W2\mathbf{x}\in\mathcal{S}^{2}_{W}, both the indicator terms in (b)) evaluate to 1. If i=ni=n is some non-rare piece in RWcR^{c}_{W}, then

      q¯W(S,n+)qW(S,n+)xW(S)|𝐱|Γ¯W(n)ζW(n)xW(S)|𝐱|Γ¯W(n)ξ2ζW(n),\displaystyle\underline{q}_{W}^{(S,n+)}\leq q_{W}^{(S,n+)}\leq\frac{x_{W}^{(S)}}{|\mathbf{x}|}\overline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}\leq\frac{x_{W}^{(S)}}{|\mathbf{x}|}\underline{\Gamma}_{W}^{(n)}\xi_{2}\zeta_{W}^{(n)}, (23)

      where

      q¯W(S,n+)\displaystyle\underline{q}_{W}^{(S,n+)} xW(S)|𝐱|[LU𝟙{RWS=}|WS|\displaystyle\coloneqq\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU\mathbbm{1}{\{R_{W}\setminus S=\emptyset\}}}{|W\setminus S|}\right.
      +Δpξ1V:W𝒲V,T:nTxV(T)𝟙[(TRW)S=]|(TW)S|]ζW(n).\displaystyle\left.+\Delta_{p}\xi_{1}\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:n\in T\end{subarray}}\frac{x_{V}^{(T)}\mathbbm{1}{[(T\cap R_{W})\setminus S=\emptyset]}}{|(T\cap W)\setminus S|}\right]\zeta_{W}^{(n)}. (24)
    2. ii)

      If WS={i}W\setminus S=\{i\}, the only piece of file-WW that is missing with the (W,S)(W,S)-peer is piece ii. Consequently, for both 𝐱𝒮W1\mathbf{x}\in\mathcal{S}^{1}_{W} and 𝐱𝒮W2\mathbf{x}\in\mathcal{S}^{2}_{W}, piece ii is the rarest piece transferable to the (W,S)(W,S)-peer, which leaves the network immediately upon downloading it. Let us denote this transition by {(S,i)W}\{(S,i-)_{W}\} and its corresponding rate by qW(S,i)q_{W}^{(S,i-)}. Then,

      |𝐱|W|𝐱|xW(S)|𝐱|WΓ¯W(i)aW(i)qW(S,i)|𝐱|W|𝐱|xW(S)|𝐱|WΓ¯W(i)ξ2aW(i),\displaystyle\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\frac{x_{W}^{(S)}}{|\mathbf{x}|_{W}}\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}\leq q_{W}^{(S,i-)}\leq\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\frac{x_{W}^{(S)}}{|\mathbf{x}|_{W}}\underline{\Gamma}_{W}^{(i)}\xi_{2}a_{W}^{(i)}, (25)

      where, for brevity, we introduced aW(i)=aW(i)(𝐱)ζW(i)𝟙{iRWc}+𝟙{iRW}a_{W}^{(i)}=a_{W}^{(i)}(\mathbf{x})\coloneqq\zeta_{W}^{(i)}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\mathbbm{1}{\{i\in R_{W}\}}.

  3. c)

    Download of Extra Piece: Recall that extra pieces are preferred only when no pieces from the file of primary interest are transferable. We shall see that the drift analysis of our Lyapunov function does not depend on the download of extra pieces. Consequently, we skip listing the associated rates.

II-F Last-Piece-Syndrome vs. Tit-for-Tat

While it is clear that a tit-for-tat mechanism helps combat the last-piece-syndrome, the issue of quantifying its efficacy via a suitable model was left as an open problem in [5]. Our stochastic model described above is partly motivated by this question. In this subsection, we show that introducing tit-for-tat does not prevent instability if a work-conserving piece-selection policy (like RF and RN) is used.

Proposition 1

Consider the multi-swarm network model as described in Section II, with a hard tit-for-tat mechanism (p=0p=0) without optimistic-unchoking (Yopt=0Y_{opt}=0). If W𝒲λW>LU\sum_{W\in\mathcal{W}}\lambda_{W}>LU, then the network is unstable under any piece-selection policy.

Proof:

We divide the network into two subsystems, where subsystem-1 consists of empty-peers and subsystem-2 consists of the rest of the peers. The two subsystems are connected in tandem as shown in Figure1.

Refer to caption
Figure 1: Subsystems 1 and 2 in Tandem.

The arrival rate of incoming peers in subsystem 1 is W𝒲λW\sum_{W\in\mathcal{W}}\lambda_{W} and the departure rate is upper-bounded by LULU (at each tick of the fixed seed’s contact-link, at most 11 empty peer can depart from subsystem-1 and there are LL such links). It is well-known that subsystem-1 is unstable if W𝒲λW>LU\sum_{W\in\mathcal{W}}\lambda_{W}>LU rendering the network unstable. Since this instability is manifested by the build-up of empty peers, we call this phenomenon, the first-piece syndrome (FPS). ∎

Figure2 shows the first-piece-syndrome manifested in a single-swarm network using a hard tit-for-tat mechanism without optimistic-unchoking.

Refer to caption
Figure 2: First Piece Syndrome in a Single-Swarm Network with Hard Tit-for-Tat (p=0p=0) and no Optimistic-unchoking (Yopt=0Y_{opt}=0). Assignment of other model parameters was W=[10]W=[10], λW=4\lambda_{W}=4, U=μ=1U=\mu=1, μ^=13\widehat{\mu}=\frac{1}{3}, L=3L=3, p=Yopt=0p=Y_{opt}=0.
Proposition 2

Consider the single-swarm network model, as presented in Section II, (a) with a soft tit-for-tat mechanism (p>0p>0) or, (b) with a hard tit-for-tat mechanism (p=0p=0) and optimistic-unchoking (Yopt=1Y_{opt}=1). If a work-conserving piece-selection policy is used, then the network is unstable if λ>LU\lambda>LU.

Proof:

The method of the proof remains the same as in [5, Proposition 2.1 (i)]. In soft tit-for-tat mechanism, a young peer can get a piece from a one-club peer with probability at least p>0p>0 whereas in a hard tit-for-tat mechanism with optimistic-unchoking, it can get a piece from a one-club peer via the optimistic-unchoke. In either case, by taking the initial size of the one-club peers suitably large, it can be shown that the last-piece-syndrome event has a positive probability, establishing the transience of the system. ∎

Propositions 1 and 2 motivate the design of a piece-selection policy that is provably stable in file-sharing networks that employ the “Soft Tit-for-Tat” and the “Hard Tit-for-Tat with Optimistic-Unchoking” mechanisms.

III Stability of swarm-based RFwPMS in the Multi-Swarm

In this section, we present our main result on the stability of swarm-based RFwPMS. The proof is established using the Foster-Lyapunov theorem [20, 21]; see Proposition 6 in Appendix F.

Theorem 1

For the multi-swarm model with non-persistent peers as described in Section II, swarm-based RFwPMS is stable over the parameter region

{U>0,𝝀>𝟎,L1,Δp>0, and KW2W𝒲}.\left\{U>0,\bm{\lambda}>\mathbf{0},L\geq 1,\Delta_{p}>0,\text{ and }K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\}.

Remark: Here, Δp>0\Delta_{p}>0 includes

  • “Soft Tit-for-Tat”: pμ>0p\mu>0 and (L=1,Yopt=0L=1,Y_{opt}=0 OR L>1L>1),

  • “Hard Tit-for-Tat with optimistic-unchoking”: p=0p=0 AND (L1,Yopt=1,μ^>0L\geq 1,Y_{opt}=1,\hat{\mu}>0), and

  • Stability result of our earlier work [15]: Yopt=1,L=1,μ^>0Y_{opt}=1,L=1,\hat{\mu}>0.

The proof of Theorem 1 uses a novel Lyapunov function that is based on the refinement of our earlier intuition in [15]. The key ideas of the proof are as follows:

  • In the case of large total-mismatch, extract negative drift from the download of rare-pieces, and use the non-rares sharing factor to upper-bound the positive component of the drift from the download of non-rare pieces; (this is proved in Lemma 7 in Appendix B and Lemma 9 in Appendix D); and

  • When the total-mismatch is not too large, extract negative drift from the download of all primary pieces (this is incorporated into the proof of Lemma 8 in Appendix C).

The Lyapunov function we use is given by

V(𝐱)\displaystyle V(\mathbf{x}) W𝒲VW(𝐱),\displaystyle\coloneqq\sum_{W\in\mathcal{W}}V_{W}(\mathbf{x}), (26)

where

VW(𝐱)VW,1(𝐱)+VW,2(𝐱)+VW,3(𝐱),VW,1(𝐱)((MWηc¯W)+)2,VW,2(𝐱)CW(1)(KW|𝐱|WPW),VW,3(𝐱)CW(2)(CW(3)PW)+.\displaystyle\begin{split}V_{W}(\mathbf{x})&\coloneqq V_{W,1}(\mathbf{x})+V_{W,2}(\mathbf{x})+V_{W,3}(\mathbf{x}),\\ V_{W,1}(\mathbf{x})&\coloneqq\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2},\\ V_{W,2}(\mathbf{x})&\coloneqq C_{W}^{(1)}\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right),\\ V_{W,3}(\mathbf{x})&\coloneqq C_{W}^{(2)}\left(C_{W}^{(3)}-P_{W}\right)^{+}.\end{split} (27)

Here, η(0,1)\eta\in(0,1) and CW(1),CW(2),CW(3)>0C^{(1)}_{W},C^{(2)}_{W},C_{W}^{(3)}\in\mathbb{R}_{>0} are suitably large constants. Instead of presenting the relations satisfied by CW(1)C^{(1)}_{W}, CW(2)C^{(2)}_{W}, and CW(3)C_{W}^{(3)} in the onset, we will go through the analysis and present them naturally at places where they are needed.

Intuition: The exact details of the Lyapunov function given by (26) and (27) are complicated. However, the following lines of thought will prove to be of substantial value in following the proof of Theorem 1.

  • Given each swarm maintains its own chunk-counts, VV being the superposition of VWV_{W}’s, reflects the intuition that the network shall be stable if and only if each swarm is stable.

  • To develop some intuition behind the choice of VWV_{W}, let us consider a multi-swarm network in which each swarm’s ally-set contains that swarm only (later in Section IV, we call this the setting of selfish swarms). In that case, the non-rares sharing factor ζW(n)\zeta_{W}^{(n)} (assuming βW>0\beta_{W}>0) takes the form exp(m¯WβWKW)\exp\left(-\frac{\overline{m}_{W}}{\beta_{W}K_{W}}\right).

    • Given that swarm-based RFwPMS would allow the download of non-rare pieces with high probability whenever the largest-mismatch m¯WMWKW1\overline{m}_{W}\geq\frac{M_{W}}{K_{W}-1} is relatively small, it is reasonable, as a starting point, to guess a term of the form (MW)2(M_{W})^{2}. Unfortunately, as it turns out, with the bounds that we have derived, working with (MW)2(M_{W})^{2} fails in satisfying the unit-transition drift stability conditions. The primary reason behind this is the fact the rarity of the rarest piece and the abundance of the non-rare pieces are not related to each other, that is, knowing that c¯W\overline{c}_{W} is large does not necessarily imply that the largest-mismatch m¯W\overline{m}_{W} is large as well. We circumvent this issue by using VW,1V_{W,1} (see (27)) as a “proxy” for (MW)2(M_{W})^{2}. Specifically, by using ((MWηc¯W)+)2\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2} instead of (MW)2(M_{W})^{2}, we avoid any drift penalization (i.e., positive drift) whenever MWM_{W} is less than ηc¯W\eta\overline{c}_{W}. Therefore, in essence, whenever MW<ηc¯WM_{W}<\eta\overline{c}_{W}, as concerns VW,1V_{W,1}, our Lyapunov function discards the distinction between rare and non-rare pieces. On the other hand, if MWηc¯WM_{W}\geq\eta\overline{c}_{W}, this implies that m¯Wη(KW1)c¯W\overline{m}_{W}\geq\frac{\eta}{(K_{W}-1)}\overline{c}_{W}, and now, the abundance of non-rare pieces, i.e., large c¯W\overline{c}_{W}, also implies a high largest-mismatch m¯W\overline{m}_{W}. This will trigger our non-rares sharing factor ζW(n)\zeta_{W}^{(n)} which will ensure that the positive component of the drift from the non-rare pieces decays to zero with increasing c¯W\overline{c}_{W}.

    • In contrast to VW,1V_{W,1}, the second term, VW,2V_{W,2}, promotes the download of every piece of file-WW. The intuition behind including VW,2V_{W,2} is to ensure a negative drift is generated from every piece download. This helps us generate sufficient negative drift in the case when VW,1V_{W,1} is inactive, i.e., when MW<ηc¯WM_{W}<\eta\overline{c}_{W}. Furthermore, an important technical purpose that it serves is to ensure that VV has finite level-sets.

    • Finally, the last term VW,3V_{W,3} handles all the states in which swarm-WW is seriously piece-deprived (states in which very few pieces of file-WW are present with swarm-WW).

Next, we present Lemmas 2 and 3 together which establish that VV has finite level-sets.

Lemma 2 (Bounds on Chunk-Counts)

For all 𝐱\mathbf{x}, the total chunk-count in swarm-WW is upper-bounded by (KW1)|𝐱|W(K_{W}-1)|\mathbf{x}|_{W}. Consequently, the fraction of swarm-WW peers who have the rarest piece, i.e., π¯W\underline{\pi}_{W}, is upper-bounded by (KW1)/KW(K_{W}-1)/K_{W} and the fraction of swarm-WW peers who are missing the rarest piece is lower-bounded by 1/KW1/K_{W}.

Proof:

For all 𝐱\mathbf{x}, we can lower bound the total chunk-count in swarm-WW as follows,

KWc¯W\displaystyle K_{W}\underline{c}_{W} iWcW(i)=PW=SxW(S)|SW|\displaystyle\leq\sum_{i\in W}c^{(i)}_{W}=P_{W}=\sum_{S}x_{W}^{(S)}|S\cap W|\leq\dots
(KW1)SxW(S)=(KW1)|𝐱|W.\displaystyle\leq(K_{W}-1)\sum_{S}x_{W}^{(S)}=(K_{W}-1)|\mathbf{x}|_{W}.

Hence, π¯WKW1KW\underline{\pi}_{W}\leq\frac{K_{W}-1}{K_{W}} and 1π¯W1KW1-\underline{\pi}_{W}\geq\frac{1}{K_{W}}. The second inequality is true because WSW\setminus S\neq\emptyset. ∎

Lemma 3 (Finite Level-Sets of VV)

V(𝐱)V(\mathbf{x})\rightarrow\infty as |𝐱||\mathbf{x}|\rightarrow\infty.

Proof:

We have PW(KW1)|𝐱|WP_{W}\leq(K_{W}-1)|\mathbf{x}|_{W} for every 𝐱\mathbf{x}. So, VW(𝐱)VW,2(𝐱)CW(1)|𝐱|WV_{W}(\mathbf{x})\geq V_{W,2}(\mathbf{x})\geq C^{(1)}_{W}|\mathbf{x}|_{W}\rightarrow\infty as |𝐱|W|\mathbf{x}|_{W}\rightarrow\infty. Since |𝐱||\mathbf{x}|\rightarrow\infty only if |𝐱|W|\mathbf{x}|_{W}\rightarrow\infty for some W𝒲W\in\mathcal{W}, it follows that V(𝐱)V(\mathbf{x})\rightarrow\infty as |𝐱||\mathbf{x}|\rightarrow\infty. Consequently, for all C+C\in\mathbb{R}_{+}, the set {𝐱:V(𝐱)C}\{\mathbf{x}:V(\mathbf{x})\leq C\} is finite. ∎

III-A Upper Bounds on Potential Changes

Having established the finite level-sets of VV, we evaluate the potential change for each possible transition. Note that, with our choice of VV, any transition that occurs in swarm-WW, affects the term VWV_{W} only.

III-A1 Arrival of an Empty Peer

The arrival of a (W,)(W,\emptyset)-peer results in a unit increase in |𝐱|W|\mathbf{x}|_{W} but does not affect any chunk-count. Therefore, MW,c¯W,PWM_{W},\overline{c}_{W},P_{W} stay the same. The potential change as a result of this transition, denoted by ΔVW(,+){\Delta V}_{W}^{(\emptyset,+)}, is component-wise given by

ΔV(W,1)(,+)\displaystyle{\Delta V}_{(W,1)}^{(\emptyset,+)} =0.\displaystyle=0.
ΔVW,2(,+)\displaystyle{\Delta V}_{W,2}^{(\emptyset,+)} =KWCW(1).\displaystyle=K_{W}C^{(1)}_{W}.
ΔV(W,3)(,+)\displaystyle{\Delta V}_{(W,3)}^{(\emptyset,+)} =0.\displaystyle=0.

Overall,

ΔVW(+)\displaystyle{\Delta V}_{W}^{(\emptyset+)} =KWCW(1).\displaystyle=K_{W}C^{(1)}_{W}. (28)

III-A2 Download of a Single Piece iWi\in W with Peer-Departure

Assume that a (W,S)(W,S)-peer with WS={i}W\setminus S=\{i\} downloads piece ii and leaves the system. The departure causes a unit-decrease in |𝐱|W|\mathbf{x}|_{W}; a unit-decrease in chunk-count of every piece jW{i}j\in W\setminus\{i\}. The chunk-count of piece ii, i.e., cW(i)c^{(i)}_{W}, stays the same. Therefore, PWP_{W} decreases by KW1K_{W}-1. The resulting potential change, denoted by ΔVW(S,i){\Delta V}_{W}^{(S,i-)}, can be component-wise upper-bounded as

ΔVW,2(S,i)CW(1).\displaystyle{\Delta V}_{W,2}^{(S,i-)}\leq-C^{(1)}_{W}.
ΔVW,3(S,i)\displaystyle{\Delta V}_{W,3}^{(S,i-)}
=CW(2)[(CW(3)PW+(KW1))+(CW(3)PW)+]\displaystyle=C^{(2)}_{W}\left[\left(C_{W}^{(3)}-P_{W}+(K_{W}-1)\right)^{+}-\left(C_{W}^{(3)}-P_{W}\right)^{+}\right]
CW(2)(KW1)𝟙{CW(3)+KW1PW}\displaystyle\leq C^{(2)}_{W}(K_{W}-1)\mathbbm{1}{\{C_{W}^{(3)}+K_{W}-1\geq P_{W}\}}
CW(2)KW𝟙{CW(3)+2KWPW}IW(2)(𝐱).\displaystyle\leq C^{(2)}_{W}K_{W}\mathbbm{1}{\{C_{W}^{(3)}+2K_{W}\geq P_{W}\}}\coloneqq I_{W}^{(2)}(\mathbf{x}).

ΔVW,1(S,i){\Delta V}_{W,1}^{(S,i-)} depends on whether ii is a rare or non-rare piece. When i=ri=r is some rare-piece, ΔVW,1(S,r){\Delta V}_{W,1}^{(S,r-)} further depends on whether swarm-WW’s chunk-distribution is uniform or non-uniform, i.e., whether 𝐱𝒮W1\mathbf{x}\in\mathcal{S}^{1}_{W} or 𝐱𝒮W2\mathbf{x}\in\mathcal{S}^{2}_{W}. If 𝐱𝒮W1\mathbf{x}\in\mathcal{S}^{1}_{W}, then cW(i)c¯Wc^{(i)}_{W}\neq\overline{c}_{W}, therefore the departure reduces both the total mismatch and the highest chunk-count by 1. This gives,

ΔVW,1(S,r)\displaystyle{\Delta V}_{W,1}^{(S,r-)}
=((MWηc¯W(1η))+)2((MWηc¯W)+)2\displaystyle=\left(\left(M_{W}-\eta\overline{c}_{W}-(1-\eta)\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
{(1η)22(1η)(MWηc¯W)if MW(1η)+ηc¯W0otherwise.\displaystyle\leq\begin{cases}(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)&\begin{array}[]{@{}l@{}}\text{if $M_{W}\geq$}\\ (1-\eta)+\eta\overline{c}_{W}\end{array}\\ 0&\text{otherwise}.\end{cases}
{2(1η)22(1η)(MWηc¯W)if MW2(1η)+ηc¯W0otherwise.\displaystyle\leq\begin{cases}2(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)&\begin{array}[]{@{}l@{}}\text{if $M_{W}\geq$}\\ 2(1-\eta)+\eta\overline{c}_{W}\end{array}\\ 0&\text{otherwise}.\end{cases}

If 𝐱𝒮W2\mathbf{x}\in\mathcal{S}^{2}_{W}, the download of piece rr makes it the only non-rare piece in the next state with its chunk-count equal to c¯W\overline{c}_{W}. The chunk-count of every other piece decreases to c¯W1\overline{c}_{W}-1. The total mismatch MWM_{W} changes from 0 to KW1K_{W}-1. Consequently,

ΔVW,1(S,r)\displaystyle{\Delta V}_{W,1}^{(S,r-)} =((KW1ηc¯W)+)2((ηc¯W)+)2\displaystyle=\left(\left(K_{W}-1-\eta\overline{c}_{W}\right)^{+}\right)^{2}-\left(\left(-\eta\overline{c}_{W}\right)^{+}\right)^{2}
KW24KW2.\displaystyle\leq K_{W}^{2}\leq 4K_{W}^{2}.

Combining the two cases for i=ri=r, we have

ΔVW,1(S,r)\displaystyle{\Delta V}_{W,1}^{(S,r-)}
{2(1η)22(1η)(MWηc¯W)0if MW2(1η)+ηc¯W,4KW2otherwise.\displaystyle\leq\begin{cases}2(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)\leq 0&\begin{array}[]{@{}l@{}}\text{if $M_{W}\geq$}\\ 2(1-\eta)+\eta\overline{c}_{W},\end{array}\\ 4K_{W}^{2}&\text{otherwise}.\end{cases}
ψ¯W(𝐱).\displaystyle\coloneqq\underline{\psi}_{W}(\mathbf{x}).

When i=ni=n is some non-rare piece171717Non-rare pieces in swarm-WW exist if and only if 𝐱𝒮W1\mathbf{x}\in\mathcal{S}^{1}_{W}., then the highest chunk-count c¯W=cW(i)\overline{c}_{W}=c^{(i)}_{W} stays the same and the total mismatch MWM_{W} increases by KW1K_{W}-1. Overall, this causes an increment of KW1KWK_{W}-1\leq K_{W} in MWηc¯WM_{W}-\eta\overline{c}_{W}. Therefore,

ΔVW,1(S,n)\displaystyle{\Delta V}_{W,1}^{(S,n-)}
=((MWηc¯W+KW)+)2((MWηc¯W)+)2\displaystyle=\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
{KW2+2KW(MWηc¯W)if MW2(1η)ηc¯W,(KW+2)2otherwise.\displaystyle\leq\begin{cases}K_{W}^{2}+2K_{W}\left(M_{W}-\eta\overline{c}_{W}\right)&\text{if $M_{W}-2(1-\eta)\geq\eta\overline{c}_{W}$},\\ (K_{W}+2)^{2}&\text{otherwise}.\end{cases}
{KW2+2KW(MWηc¯W)if MW2(1η)ηc¯W,4KW2otherwise\displaystyle\leq\begin{cases}K_{W}^{2}+2K_{W}\left(M_{W}-\eta\overline{c}_{W}\right)&\text{if $M_{W}-2(1-\eta)\geq\eta\overline{c}_{W}$},\\ 4K_{W}^{2}&\text{otherwise}\\ \end{cases}
ψ¯W(𝐱).\displaystyle\coloneqq\overline{\psi}_{W}(\mathbf{x}).

To utilize the negative drift from the download of swarm-WW’s rare pieces, we partition the state-space into regions W1={𝐱:MW2(1η)ηc¯W}\mathcal{R}_{W}^{1}=\{\mathbf{x}:M_{W}-2(1-\eta)\geq\eta\overline{c}_{W}\} and W2=𝒮W1\mathcal{R}_{W}^{2}=\mathcal{S}\setminus\mathcal{R}_{W}^{1}. (Note that W1𝒮W1\mathcal{R}_{W}^{1}\subseteq\mathcal{S}^{1}_{W} and W2𝒮W2\mathcal{R}_{W}^{2}\supseteq\mathcal{S}^{2}_{W}). We can now write

ΔVW(S,i)\displaystyle{\Delta V}_{W}^{(S,i-)}
ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1)+IW(2)\displaystyle\leq\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}-C^{(1)}_{W}+I_{W}^{(2)}
=𝟙{𝐱W2}4KW2+\displaystyle=\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}+\dots
+𝟙{𝐱W1}(ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\hskip 10.0pt+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\left(\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right)-\dots
CW(1)+IW(2)\displaystyle\hskip 10.0pt-C^{(1)}_{W}+I_{W}^{(2)}
ΨW(i)(𝐱).\displaystyle\coloneqq\Psi_{W}^{(i-)}(\mathbf{x}). (29)

III-A3 Download of a Single Piece iWi\in W without Peer Departure

Here, a (W,S)(W,S)-type peer with WS{i}W\setminus S\supsetneq\{i\} downloads piece ii and remains in the system. The total number of swarm-WW peers remains the same and the chunk-count of piece ii (and thus PWP_{W}) gets incremented by 1. The resulting potential change, denoted by ΔVW(S,i+)\Delta V_{W}^{(S,i+)} is component-wise upper-bounded as

ΔVW,2(S,i+)\displaystyle{\Delta V}_{W,2}^{(S,i+)} =CW(1),\displaystyle=-C^{(1)}_{W},
ΔVW,3(S,i+)\displaystyle{\Delta V}_{W,3}^{(S,i+)} =CW(2)[(CW(3)PW1)+(CW(3)PW)+]\displaystyle=C^{(2)}_{W}\left[\left(C_{W}^{(3)}-P_{W}-1\right)^{+}-\left(C_{W}^{(3)}-P_{W}\right)^{+}\right]
CW(2)𝟙{CW(3)1PW}\displaystyle\leq-C^{(2)}_{W}\mathbbm{1}{\{C_{W}^{(3)}-1\geq P_{W}\}}
CW(2)𝟙{CW(3)2PW}IW(1)(𝐱).\displaystyle\leq-C^{(2)}_{W}\mathbbm{1}{\{C_{W}^{(3)}-2\geq P_{W}\}}\coloneqq-I_{W}^{(1)}(\mathbf{x}).

Like ΔVW,1(S,i){\Delta V}_{W,1}^{(S,i-)}, one can show that ΔVW,1(S,i+){\Delta V}_{W,1}^{(S,i+)} is upper-bounded by ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}. Therefore,

ΔVW(S,i+)\displaystyle{\Delta V}_{W}^{(S,i+)}
ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1)IW(1)\displaystyle\leq\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}-C^{(1)}_{W}-I_{W}^{(1)}
=𝟙{𝐱W2}4KW2+\displaystyle=\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}+\dots
+𝟙{𝐱W1}(ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\hskip 10.0pt+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\left(\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right)
CW(1)IW(1)\displaystyle\hskip 10.0pt-C^{(1)}_{W}-I_{W}^{(1)}
ΨW(i+)(𝐱).\displaystyle\coloneqq\Psi_{W}^{(i+)}(\mathbf{x}). (30)

Looking at (III-A3) and (III-A2), we note that by choosing CW(1)>4KW2C^{(1)}_{W}>4K_{W}^{2}, say CW(1)8KW2C^{(1)}_{W}\geq 8K_{W}^{2}, we ensure that the term 𝟙{𝐱W2}4KW2CW(1)\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W} is non-positive. Intuitively, this means that over the region W2\mathcal{R}_{W}^{2}, as concerns the potential-change, our upper-bounds treat the non-rare and rare pieces in the same way.

III-A4 Download of a Single Extra Piece

It can be observed that for any swarm-WW, no potential change is induced in VWV_{W} by the download of its extra pieces.

III-A5 Two-Sided Piece Exchanges

Now, we consider the state-transitions that involve two mutually-ally peers, each transferring a piece to the other, as a result of some tit-for-tat contact initiated by one of them. In 4), we noted that no potential change is induced by the download of extra pieces. Therefore, as concerns the potential changes, all those transitions that involve the transfer of two extra pieces can be ignored. Similarly, those transitions that involve the transfer of an extra-piece coupled with some rare/non-rare piece can be viewed as (single) download of the accompanying rare/non-rare piece, which we have covered in 1)-3). We therefore focus only on those transitions that involve the transfer of two non-extra pieces. For this, consider two mutually-ally peers, say a (W,S)(W,S)-peer missing piece iWi\in W (and holding piece jVj\in V) and a (V,T)(V,T)-peer missing piece jj (and holding piece ii), who download the respective missing pieces as a result of a tit-for-tat contact initiated by one of them. We denote this transition by {(S,i±)W,(T,j±)V}\{(S,i\pm)_{W},(T,j\pm)_{V}\} where ``′′``-^{\prime\prime} indicates departure of the peer and ``+′′``+^{\prime\prime} indicates otherwise. From 1)-3), we note that the potential change induced by this piece exchange will depend on

  • The type of piece ii (i=rRWi=r\in R_{W} or i=nRWci=n\in R^{c}_{W}),

  • The type of piece jj (j=rRVj=r^{\prime}\in R_{V} or j=nRVcj=n^{\prime}\in{R}_{V}^{c}),

  • Whether (W,S)(W,S)-peer stays in or leaves the system, (WS{i}W\setminus S\supsetneq\{i\} or WS={i}W\setminus S=\{i\}), and

  • Whether (V,T)(V,T)-peer stays in or leaves the system (VT{j}V\setminus T\supsetneq\{j\} or VT={j}V\setminus T=\{j\}).

Table I summarizes the upper-bounds on the potential change associated with each of those cases. Importantly, in each case, the upper-bound has been decomposed as the sum of two upper-bounds for the corresponding single piece download events. The bounds are obvious for the case WVW\neq V and with some work, are fairly easy to establish when W=VW=V. For completeness, they are derived in Appendix A.

TABLE I: Upper-Bounds on Potential Changes associated with Simultaneous Download of pieces ii and jj by mutually ally-peers (W,S)(W,S) and (V,T)(V,T) respectively
Category Transition Potential Change
1 (i,+)W,(j,+)V(i,+)_{W},(j,+)_{V} ΨW(i+)+ΨV(j+)\Psi_{W}^{(i+)}+\Psi_{V}^{(j+)}
2 (i,+)W,(j,)V(i,+)_{W},(j,-)_{V} ΨW(i+)+ΨV(j)\Psi_{W}^{(i+)}+\Psi_{V}^{(j-)}
(i,)W,(j,+)V(i,-)_{W},(j,+)_{V} ΨW(i)+ΨV(j+)\Psi_{W}^{(i-)}+\Psi_{V}^{(j+)}
3 (i,)W,(j,)V(i,-)_{W},(j,-)_{V} ΨW(i)+ΨV(j)\Psi_{W}^{(i-)}+\Psi_{V}^{(j-)}

III-B Upper Bounds on Unit-Transition Drifts

Having established upper-bound estimates of the potential changes, we can now proceed to evaluate the unit-transition drift QV(𝐱){QV}(\mathbf{x}). We have established that for any swarm WW, the upper-bound on potential-change induced by the download of piece iWi\in W depends only on its type (iRWi\in R_{W} or iRWci\in R^{c}_{W}), whether or not the download is accompanied with the departure of the peer (i+i+ or ii-), and the current chunk-distribution in swarm-WW (ΨW(r+)\Psi_{W}^{(r+)} and ΨW(r)\Psi_{W}^{(r-)} depend on whether 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1} or 𝐱W2\mathbf{x}\in\mathcal{R}_{W}^{2}). Thus, for any state 𝐱\mathbf{x}, we can write

QV(𝐱)\displaystyle{{QV}}\left(\mathbf{x}\right) =W𝒲QVW(,+)+W𝒲QVW(RW+)+QVW(RWc+)QVW(W+)\displaystyle=\sum_{W\in\mathcal{W}}{{QV}}_{W}^{(\emptyset,+)}+\sum_{W\in\mathcal{W}}\underbrace{{{QV}}_{W}^{(R_{W}+)}+{{QV}}_{W}^{(R^{c}_{W}+)}}_{\coloneqq{{QV}}_{W}^{(W+)}}
+QVW(RW)+QVW(RWc)QVW(W),\displaystyle\hskip 30.0pt+\underbrace{{{QV}}_{W}^{(R_{W}-)}+{{QV}}_{W}^{(R^{c}_{W}-)}}_{\coloneqq{{QV}}_{W}^{(W-)}}, (31)

where

QVW(,+)(𝐱)qW(,+)ΔVW(,+),QVW(RW+)(𝐱)rRW,WS{r}qW(S,r+)ΔVW(S,r+),QVW(RW)(𝐱)rRW,WS={r}qW(S,r)ΔVW(S,r),QVW(RWc+)(𝐱)nRWc,WS{n}qW(S,n+)ΔVW(S,n+),QVW(RWc)(𝐱)nRWc,WS={n}qW(S,n)ΔVW(S,n).\displaystyle\begin{split}{QV}_{W}^{(\emptyset,+)}(\mathbf{x})&\coloneqq q_{W}^{(\emptyset,+)}{\Delta V}_{W}^{(\emptyset,+)},\\ {QV}_{W}^{(R_{W}+)}(\mathbf{x})&\coloneqq\sum_{\begin{subarray}{c}r\in R_{W},\\ W\setminus S\supsetneq\{r\}\end{subarray}}q_{W}^{(S,r+)}{\Delta V}_{W}^{(S,r+)},\\ {QV}_{W}^{(R_{W}-)}(\mathbf{x})&\coloneqq\sum_{\begin{subarray}{c}r\in R_{W},\\ W\setminus S=\{r\}\end{subarray}}q_{W}^{(S,r-)}{\Delta V}_{W}^{(S,r-)},\\ {QV}_{W}^{(R^{c}_{W}+)}(\mathbf{x})&\coloneqq\sum_{\begin{subarray}{c}n\in R^{c}_{W},\\ W\setminus S\supsetneq\{n\}\end{subarray}}q_{W}^{(S,n+)}{\Delta V}_{W}^{(S,n+)},\\ {QV}_{W}^{(R^{c}_{W}-)}(\mathbf{x})&\coloneqq\sum_{\begin{subarray}{c}n\in R^{c}_{W},\\ W\setminus S=\{n\}\end{subarray}}q_{W}^{(S,n-)}{\Delta V}_{W}^{(S,n-)}.\end{split} (32)

III-B1 Empty Peer Arrivals

Let |𝝀|W𝒲λW|\bm{\lambda}|\coloneqq\sum_{W\in\mathcal{W}}\lambda_{W} and C(1)maxW𝒲KWCW(1)C^{(1)}\coloneqq\max_{W\in\mathcal{W}}K_{W}C^{(1)}_{W}. Using (17) and (28),

W𝒲QVW(,+)|𝝀|C(1).\displaystyle\sum_{W\in\mathcal{W}}{QV}_{W}^{(\emptyset,+)}\leq|\bm{\lambda}|C^{(1)}. (33)

III-B2 Downloads of Primary Pieces without Peer Departure

The potential-change from the download of rare-pieces without accompanying peer-departure via the rarest-first (RF) mechanism is non-positive. (ΨW(r+)\Psi_{W}^{(r+)} is always non-positive). In Lemma 7 in Appendix B, we upper-bound the corresponding drift by what we would have obtained if we were to replace RF by random-novel (RN), i.e.,

QVW(RW+)\displaystyle{QV}_{W}^{(R_{W}+)} rRW,WS{r}xW(S)|𝐱|[LU|RWS|\displaystyle\leq\sum_{\begin{subarray}{c}r\in R_{W},\\ W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU}{|R_{W}\setminus S|}\right.
+Δpξ1V:W𝒲V,T:rTxV(T)|(TRW)S|]ΨW(r+).\displaystyle\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\right]\Psi_{W}^{(r+)}. (34)

Remark: Since (III-B2) is also an upper-bound for the download of rare-pieces using the random-novel (RN) mechanism, the stability proof of RFwPMS also works for “RNwPMS” – a piece-selection policy same as RFwPMS except that rare-pieces are downloaded randomly.

Using (23), (b)), (III-A3), and the fact that 𝟙{𝐱W2}4KW2CW(1)IW(1)0\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\leq 0, we get

QV(RWc+)\displaystyle QV^{(R^{c}_{W}+)} nRWc,WS{n}q¯W(S,n+)[𝟙{𝐱W2}4KW2CW(1)\displaystyle\leq\sum_{\begin{subarray}{c}n\in R^{c}_{W},\\ W\setminus S\supsetneq\{n\}\end{subarray}}\underline{q}_{W}^{(S,n+)}\left[\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}\right.
IW(1)]+nRWc,WS={n}xW(S)|𝐱|Γ¯W(n)ξ2ψ¯W𝟙{𝐱W1}ζW(n).\displaystyle-\left.I_{W}^{(1)}\right]+\sum_{\begin{subarray}{c}n\in R^{c}_{W},\\ W\setminus S=\{n\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\underline{\Gamma}_{W}^{(n)}\xi_{2}\overline{\psi}_{W}\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}}\zeta_{W}^{(n)}. (35)

Lemma 8 in Appendix C combines (III-B2) and (III-B2) to give

QVW(W+)\displaystyle{QV}_{W}^{(W+)} |𝐱|W|𝐱|iWΓ¯W(i)aW(i)KW(1πW(i)γW(i))\displaystyle\leq\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)
×[𝟙{𝐱W1}(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\times\left[\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}}\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)IW(1)],\displaystyle\left.+\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right], (36)

where, we have introduced γW(i)\gamma_{W}^{(i)} as a short-hand for S:WS={i}xW(S)|𝐱|W\frac{\sum_{S:W\setminus S=\{i\}}x_{W}^{(S)}}{|\mathbf{x}|_{W}}, i.e., the fraction of swarm-WW peers missing only piece ii of file-WW.

III-B3 Downloads of Primary Pieces with Peer Departure

Using (25), (III-A2), and the fact that 𝟙{𝐱W2}4KW2CW(1)+𝟙{𝐱W1}ψ¯W𝟙{iRW}0\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\leq 0, we have

QVW(W)\displaystyle{QV}_{W}^{(W-)} |𝐱|W|𝐱|iWΓ¯W(i)aW(i)γW(i)\displaystyle\leq\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\sum_{i\in W}\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}\gamma_{W}^{(i)}
[𝟙{𝐱W1}(ξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\left[\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}}\left(\xi_{2}\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)+ξ2IW(2)],\displaystyle\left.+\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}}4K_{W}^{2}-C^{(1)}_{W}+\xi_{2}I_{W}^{(2)}\right], (37)

III-B4 Combining Everything

Let us define

ΨW(i)(𝐱)\displaystyle\Psi_{W}^{(i)}(\mathbf{x}) 𝟙{𝐱W2}4KW2\displaystyle\coloneqq\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}
+𝟙{𝐱W1}(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right)
CW(1).\displaystyle-C^{(1)}_{W}. (38)

Then, using (33), (III-B2), and (III-B3), in (III-B), we get

QV(𝐱)\displaystyle QV(\mathbf{x}) W𝒲|𝐱|W|𝐱|QV~W,\displaystyle\leq\sum_{W\in\mathcal{W}}\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\widetilde{QV}_{W}, (39)

where

QV~W(𝐱)\displaystyle\widetilde{QV}_{W}(\mathbf{x}) |𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))ΨW(i)\displaystyle\coloneqq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\Psi_{W}^{(i)}\right.
(1πW(i)γW(i))IW(1)+γW(i)KWξ2IW(2)].\displaystyle\left.-\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)I_{W}^{(1)}+\gamma_{W}^{(i)}K_{W}\xi_{2}I_{W}^{(2)}\right]. (40)

With this initial setup in place, the rest of the proof is provided as a succession of lemmas in Appendix E.

IV Discussion

IV-A Sharing vs Suppression Trade-off for Non-Rare Pieces

Note that with αW(0,1]\alpha_{W}\in(0,1] sufficiently small, if we take the limit βW\beta_{W}\rightarrow\infty, swarm-based RFwPMS converges to a swarm-based version of RF (which is unstable in high arrival-rate regime), whereas if we take the limit βW0\beta_{W}\rightarrow 0, swarm-based RFwPMS converges to a swarm-based version of MS [11]. Thus, our expectation is that by choosing αW\alpha_{W} sufficiently small, and βW\beta_{W} appropriately, an appropriate trade-off between the sharing and suppression of the non-rare pieces can be found. Via numerical simulations, we found that the expected sojourn time reduces with decreasing αW\alpha_{W}, and choosing βW\beta_{W} close to 1.5 appears to minimize it.

IV-B Inter-Swarm Collaboration

Our multi-swarm model in section II is general in terms of inter-swarm behavior of peers and their secondary download preferences. Here, we discuss three different behaviors that are covered:

  1. a)

    Altruistic Swarms: In most wired P2P environments (e.g., the Internet), peers are generally insensitive to the consumption of their download and upload bandwidths, and they may download extra pieces in order to help other swarms. Such behavior can be captured in our model by setting 𝒲W=𝒲\mathcal{W}_{W}=\mathcal{W} and W=\mathcal{F}_{W}=\mathcal{F} for every W𝒲W\in\mathcal{W}. From [8], a network in which all swarms are altruistic is called a universal swarm network.

  2. b)

    Opportunistic Swarms: A different type of altruism is when peers do not download any extra pieces but share their pieces with those of other swarms who need them. We obtain this by setting 𝒲W=𝒲\mathcal{W}_{W}=\mathcal{W} and W=W\mathcal{F}_{W}=W for every W𝒲W\in\mathcal{W}.

  3. c)

    Selfish Swarms: In wireless P2P networks, peers are generally sensitive to the consumption of their download and upload bandwidths. This holds by setting 𝒲W={W}\mathcal{W}_{W}=\{W\} and W=W\mathcal{F}_{W}=W. Thus, the peers do not download any extra pieces nor do they upload any piece to other swarms.

IV-C Piece-Selection Policies for Excess-Cache

In our original version of RFwPMS, random-selection was assumed for the download of extra pieces, but the stability result in Theorem 1 extends to any piece-selection policy one may use for the excess-cache. Without loss of generality, consider a piece-selection policy for the excess cache, whose transferable set is denoted by E(𝐱,T^,W,S)E(\mathbf{x},\widehat{T},W,S), i.e., EE satisfies

E(𝐱,T^,W,S)(T^W)(SW).E(\mathbf{x},\widehat{T},W,S)\subseteq\left(\widehat{T}\cap\mathcal{F}_{W}\right)\setminus\left(S\cup W\right).

Recall that the Lyapunov function given by (26) and (27) is not affected by a piece download from the set EE. Consequently, all the bounds on QV(𝐱)QV(\mathbf{x}) including Lemma 15 still hold. The final step of combining Lemma 15 and Proposition 6 has to be modified, however, as under some policies, the Markov process may no longer be irreducible with the current definitions of the state-space (16) and state (1). For instance, take a single-swarm network in which E=E=\emptyset, and the incoming swarm denoted by swarm-WW satisfies W=W.\mathcal{F}_{W}=\mathcal{F}\supsetneq W. Then the set of all states in which some peer holds a piece from the set W\mathcal{F}\setminus W is not reachable from any state. In such cases, the set of all states that are reachable from the empty state is a closed irreducible set of states and should be defined as the state-space of the network. Stability then follows from combining Lemma 15 and Proposition 6. We summarize this discussion in the following proposition.

Proposition 3

For the multi-swarm network model with non-persistent peers as described in Section II, swarm-based RFwPMS with any piece-selection policy for the excess-cache, is stable over the parameter region

{U>0,𝝀>𝟎,L1,Δp>0, and KW2W𝒲}.\displaystyle\left\{U>0,\bm{\lambda}>\mathbf{0},L\geq 1,\Delta_{p}>0,\text{ and }K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\}.

IV-D Autonomous Swarms

One more case to consider is when all the swarms in the network operate in isolation from each other. Specifically, a peer belonging to swarm-WW contacts and exchanges pieces with peers in the same swarm. The fixed seed, on the other hand, divides its uploading capacity across swarms, providing a static non-zero fraction of its total capacity to each swarm; optimal partition of the seed capacity is for future work. Such swarms are called autonomous swarms in [8]. The stability of swarm-based RFwPMS holds for such swarms as well.

Corollary 3.1

Consider a multi-swarm network where each swarm W𝒲W\in\mathcal{W} behaves autonomously and the seed has allocated a static non-zero fraction of its total capacity for each swarm-WW (say UW>0U_{W}>0). Then, the network is stable under swarm-based RFwPMS over the parameter region

{U>0,𝝀>𝟎,L1,Δp>0, and KW2W𝒲}.\displaystyle\left\{U>0,\bm{\lambda}>\mathbf{0},L\geq 1,\Delta_{p}>0,\text{ and }K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\}.
Proof:

Each swarm-WW can be considered as an isolated single-swarm network with fixed seed of capacity UW>0U_{W}>0. Stability then follows by applying Theorem 1 to each swarm. ∎

IV-E Optimistic-Unchoking and Tit-for-Tat

In our description of the Peer-Contact Policy in Section II-C, peer-(1)(1) makes a tit-for-tat contact with peer-(2)(2), it is assumed that the probability of peer-(k)(k) committing to transfer a piece to peer-(k)(-k), in the event that it does not benefit from peer-(k)(-k) is some fixed value, p[0,1]p\in[0,1]. However, from the stability analysis in Appendix E, one may note that this assumption can be relaxed in two ways. i) If the network enforces optimistic-unchoking on the incoming peers, i.e., Yopt=1Y_{opt}=1, then the system is inherently stable regardless of what pp value is chosen by each peer in any of its tit-for-tat contacts – indeed it may depend on the history of peer-(k)(k)’s interactions with peer-(k)(-k). (Δp\Delta_{p} remains positive implying ξ2\xi_{2} in (b)) remains finite). ii) In the case that Yopt=0Y_{opt}=0, the stability of the network still holds with variable pp values as long as peers are forced to choose pp values larger than or equal to some positive threshold value p0(0,1]p_{0}\in(0,1]. (Δp\Delta_{p} remains positive implying ξ2\xi_{2} in (b)) remains finite). In particular, this means that our stability result holds for a history based tit-for-tat mechanism where each peer keeps track of its interactions with other peers. From i) and ii), we get the following proposition.

Proposition 4

Consider the multi-swarm network model with non-persistent peers (as described in Section II) with the change that now each peer, in any tit-for-tat contact, can choose a variable pp value in [p0,1][p_{0},1]. Then, swarm-based RFwPMS is stable over the parameter region

{μ>0,U>0,𝝀>𝟎,L1,(p0>0 or Yopt=1), and \displaystyle\left\{\mu>0,U>0,\bm{\lambda}>\mathbf{0},L\geq 1,(p_{0}>0\text{ or }Y_{opt}=1),\text{ and }\right.
KW2W𝒲}.\displaystyle\hskip 40.0pt\left.K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\}.

IV-F Comparison with Work of [11, 12, 13]

As mentioned in Section I-A, [13] introduced a threshold based version of mode-suppression, where the non-rare pieces are (completely) suppressed only when the largest-mismatch crosses a fixed constant threshold. Compared with this, swarm-based RFwPMS inhibits the replication of non-rare pieces by smoothly decreasing the non-rares sharing factor ζW(n)\zeta_{W}^{(n)} in proportion with the largest-mismatch value. In Section VI-D2, we note that a smoother-suppression like this should be preferred compared to a strictly threshold-based suppression.

Another notable observation is that [11, 12, 13] perform random-selection on the set of available rare pieces. We assert that knowing the chunk distribution should allow for more advantage than just random-selection, and that a load-balancing scheme like rarest-first should do a better job in reducing the duration of transient phases. This gets manifested in Section VI-D2 and is also in line with the practical conclusions made in [22] (albeit without a theoretical analysis).

IV-G Effect of Policy Parameters {αW}\{\alpha_{W}\}:

An interesting question is whether or not the stability result for swarm-based RFwPMS can be extended to the case when αW=0\alpha_{W}=0 for at least one of the swarms. From Lemma 9, we see that the positive component of QVW(RWc)QV_{W}^{(R^{c}_{W})} can be upper-bounded by a fixed constant, namely

DW=DW(1)+DW(2)𝟙{𝒲W{W}}, where DW(1)=12e2η2ξ2(LU+Δp)βW2KW7DW(2)=3e2η1ξ2(LU+Δp)βW1+αW1KW5+αW1.\displaystyle\begin{split}D_{W}&=D_{W}^{(1)}+D_{W}^{(2)}\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\},\text{ where }\\ D_{W}^{(1)}&=12e^{-2}\eta^{-2}\xi_{2}(LU+\Delta_{p})\beta_{W}^{2}K_{W}^{7}\\ D_{W}^{(2)}&=3e^{-2}\eta^{-1}\xi_{2}(LU+\Delta_{p})\beta_{W}^{1+\alpha_{W}^{-1}}K_{W}^{5+\alpha_{W}^{-1}}.\end{split} (41)

If WW does not have any ally-swarm besides WW, i.e., 𝒲W{W}=\mathcal{W}_{W}\setminus\{W\}=\emptyset, then DWD_{W} is independent of αW\alpha_{W}. This immediately gives the below proposition.

Proposition 5

For the multi-swarm model with non-persistent peers as described in Section II, swarm-based RFwPMS is stable over the parameter region

{U>0,𝝀>𝟎,L1,Δp>0, and KW2W𝒲}.\displaystyle\left\{U>0,\bm{\lambda}>\mathbf{0},L\geq 1,\Delta_{p}>0,\text{ and }K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\}.

where αW\alpha_{W} can be chosen to be zero for any swarm which does not have any other ally-swarms (besides itself).

When swarm-WW has other ally-swarms, the constant DWD_{W}\rightarrow\infty as αW0\alpha_{W}\rightarrow 0. Based on this, one may speculate that the stability of swarm-based RFwPMS is tightly coupled with the choice of {αW}\{\alpha_{W}\}’s in the sense that the state of the system can possibly spiral out into ever increasing loads if αW=0\alpha_{W}=0 for swarms WW that have other ally-swarms also. However, this does not seem to be the case in the numerical simulations we have performed. Figure3 shows one such numerical snapshot for illustration.

Refer to caption
Figure 3: Stability-check of a Three-Swarm Network when αW=0\alpha_{W}=0. The file-configurations were W1=[10],W2=[6,15]W_{1}=[10],W_{2}=[6,15], W3=[16,30]W_{3}=[16,30] and all swarms interacted altruistically. Initial state of each swarm was one-club – all peers in the swarm missing one specific piece of the file. Assignment of other model parameters was 𝝀=(8,4,2),U=13,μ=1,μ^=13,L=3,p=0.5,Yopt=1,βW=1.5\bm{\lambda}=(8,4,2),U=\frac{1}{3},\mu=1,\widehat{\mu}=\frac{1}{3},L=3,p=0.5,Y_{opt}=1,\beta_{W}=1.5.

This corroborates the assertion that the parameter αW\alpha_{W} is a technical artifact in our setting, put in place to circumvent the issue of the positive component of the drift from the download of non-rare pieces in the case of ever increasingly large states where dW(n)d^{(n)}_{W} is large. For the aforementioned reasons, we believe that swarm-based RFwPMS is stable in the setting when αW\alpha_{W}’s can assume zero values. We state this as a conjecture below.

Conjecture 1

For the multi-swarm model with non-persistent peers as described in Section II, swarm-based RFwPMS is stable over the parameter region

{U>0,𝝀>𝟎,L1,Δp>0, and KW2W𝒲},\displaystyle\left\{U>0,\bm{\lambda}>\mathbf{0},L\geq 1,\Delta_{p}>0,\text{ and }K_{W}\geq 2\ \forall\ W\in\mathcal{W}\right\},

where αW\alpha_{W} can be chosen to be zero for any W𝒲W\in\mathcal{W}.

IV-H Scalability of swarm-based RFwPMS

Scalability is also necessary for a P2P network, i.e., the system-wide throughput should scale with the number of peers. For the multi-swarm model presented in Section II, this means that the expected steady-state sojourn time in the network should be upper-bounded by a constant independent of 𝝀\bm{\lambda}. Unfortunately, analytically showing the scalability of stochastic models similar to the one we considered in this work is a hard endeavor and we leave this as an open problem. However, using an approach similar to that used in [12, 13], we are able to show (under a mild assumption) the scalability of RFwPMS in the single-swarm case. This result is formally stated below.

Theorem 4

For the single-swarm case of the multi-swarm model described in Section II (i.e., 𝒲={W},=W,|𝐱|W=|𝐱|\mathcal{W}=\{W\},\mathcal{F}=W,|\mathbf{x}|_{W}=|\mathbf{x}|), provided that the empty-peers are always push-contacted in all tit-for-tat contacts, swarm based RFwPMS is scalable over its stability region. That is, the steady-state expected sojourn-time, denoted by T¯W\overline{T}_{W}, is upper-bounded by a constant independent of the arrival-rate of empty-peers. In particular,

T¯W={O(KW3)if 2KW2λWLU,O(KW6)if 2KW2λW>LU.\displaystyle\overline{T}_{W}=\begin{cases}O\left(K_{W}^{3}\right)&\text{if }2K_{W}^{2}\lambda_{W}\leq LU,\\ O\left(K_{W}^{6}\right)&\text{if }2K_{W}^{2}\lambda_{W}>LU.\end{cases}

The proof is established using Kingman’s moment bound [20] which uses the well-known technique of designing a suitable non-negative function and setting the steady-state expectation of its unit-transition drift equal to zero. Provided that the Markov chain is positive-recurrent, one usually hopes to obtain some convenient bound on the queue-length. For reference, please see Proposition 6 in Appendix F.

In the next section, we provide the proof of Theorem 4.

V Scalability of swarm based RFwPMS in the Single-Swarm

Positive-recurrence of {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} is guaranteed by Theorem 1. Thus, to establish scalability, the key novelty is to first partition the stability region into two distinct load-regimes based on the size of total arrival-rate λW\lambda_{W} in comparison to the seed’s aggregate upload capacity LULU and then design a suitable non-negative function for each. The regimes are

  1. i)

    1={λW<0.5KW2LU}\mathcal{L}_{1}=\left\{\lambda_{W}<0.5K_{W}^{-2}LU\right\}; and

  2. ii)

    2={λW0.5KW2LU}\mathcal{L}_{2}=\left\{\lambda_{W}\geq 0.5K_{W}^{-2}LU\right\}.

Let us denote the stationary distribution of {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} by {ρ(𝐱):𝐱𝒮}\{\rho(\mathbf{x}):\mathbf{x}\in\mathcal{S}\}, so that the expected number of peers in steady-state is given by 𝔼ρ[|𝐱|]=𝔼ρ[|𝐱|W]\mathbb{E}_{\rho}[|\mathbf{x}|]=\mathbb{E}_{\rho}[|\mathbf{x}|_{W}], and by Little’s Law T¯W=λW1𝔼ρ[|𝐱|W]\overline{T}_{W}=\lambda_{W}^{-1}\mathbb{E}_{\rho}[|\mathbf{x}|_{W}].

V-A Low Load Regime 1\mathcal{L}_{1}

For regime 1\mathcal{L}_{1}, we have the following Lemma.

Lemma 5

For the single-swarm case of the multi-swarm model described in Section II, with swarm-based RFwPMS as the piece-selection policy, if the network parameters belong to 1\mathcal{L}_{1}, then the steady-state expected sojourn time T¯W\overline{T}_{W} is independent of λW\lambda_{W}. In particular, T¯W=O(KW3)\overline{T}_{W}=O(K_{W}^{3}).

Proof:

The intuition behind this upper-bound is as follows: In 1\mathcal{L}_{1}, the total arrival-rate λW\lambda_{W} is sufficiently small compared to the seed’s aggregate upload-rate LULU; therefore, we expect the seed to quickly flush the system without any contribution from the normal peers. Keeping this in mind, the μ,μ^\mu,\hat{\mu}-independent bound, KW2(KW+1)LU\frac{K_{W}^{2}(K_{W}+1)}{LU}, can be established by using Kingman’s moment bound on a suitable non-negative function. Let

V1(𝐱)=(KW|𝐱|WPW)2+KW|𝐱|WPW.\displaystyle V_{1}(\mathbf{x})=\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right)^{2}+K_{W}|\mathbf{x}|_{W}-P_{W}.

It can be observed that VV heavily penalizes the states with large number of missing pieces.181818KW|𝐱|WPW=iW|𝐱|WcW(i)K_{W}|\mathbf{x}|_{W}-P_{W}=\sum_{i\in W}|\mathbf{x}|_{W}-c^{(i)}_{W} is the number of pieces of WW missing in swarm-WW. The arrival of an empty-peer in swarm WW causes a unit-increase in |𝐱|W|\mathbf{x}|_{W}. So, the potential change associated with the arrival of an empty-peer is given by

ΔV1(,+)Φ(,+)KW2+2KW(KW|𝐱|WPW)+KW.\displaystyle{\Delta V}_{1}^{(\emptyset,+)}\leq\Phi^{(\emptyset,+)}\coloneqq K_{W}^{2}+2K_{W}\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right)+K_{W}. (42)

The download of a piece iWi\in W by any (W,S)(W,S) peer causes a unit-decrease in the difference KW|𝐱|WPWK_{W}|\mathbf{x}|_{W}-P_{W}. Therefore,

ΔV1(S,i±)Φ¯2(KW|𝐱|WPW).\displaystyle{\Delta V}_{1}^{(S,i\pm)}\leq\underline{\Phi}\coloneqq-2\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right). (43)

Upper-bounding QV(𝐱){QV}(\mathbf{x}) by considering peer-arrivals and downloads of the rarest-pieces (from R¯(,W,S)\underline{R}_{(\mathcal{F},W,S)}) by the fixed seed only,

QV1(𝐱)λWΦ(,+)+r¯R¯(,W,S)(1π¯W)LU|R¯(,W,S)|Φ¯\displaystyle{QV_{1}}(\mathbf{x})\leq\lambda_{W}\Phi^{(\emptyset,+)}+\sum_{\underline{r}\in\underline{R}_{(\mathcal{F},W,S)}}\left(1-\underline{\pi}_{W}\right)\frac{LU}{|\underline{R}_{(\mathcal{F},W,S)}|}\underline{\Phi}
=(a)λWΦ(,+)+LUKW1Φ¯\displaystyle\stackrel{{\scriptstyle\textnormal{(a)}}}{{\mathstrut{=}}}\lambda_{W}\Phi^{(\emptyset,+)}+LUK_{W}^{-1}\underline{\Phi}
=(b)λW(KW2+2KW(KW|𝐱|WPW)+KW)\displaystyle\stackrel{{\scriptstyle\textnormal{(b)}}}{{\mathstrut{=}}}\lambda_{W}\left(K_{W}^{2}+2K_{W}\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right)+K_{W}\right)
2LUKW1(KW|𝐱|WPW)\displaystyle\hskip 60.0pt-2LUK_{W}^{-1}\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right)
=λW(KW2+KW)\displaystyle=\lambda_{W}(K_{W}^{2}+K_{W})
2(LUKW1λWKW)(KW|𝐱|WPW)\displaystyle\hskip 20.0pt-2\left(LUK_{W}^{-1}-\lambda_{W}K_{W}\right)\left(K_{W}|\mathbf{x}|_{W}-P_{W}\right)
(c)λW(KW2+KW)KW1LU|𝐱|W.\displaystyle\stackrel{{\scriptstyle\textnormal{(c)}}}{{\mathstrut{\leq}}}\lambda_{W}(K_{W}^{2}+K_{W})-K_{W}^{-1}LU|\mathbf{x}|_{W}. (44)

Here, (V-A) uses 1π¯WKW11-\underline{\pi}_{W}\geq K_{W}^{-1} (Lemma 2); (V-A) uses (42) and (43); (44) follows from λW<0.5KW2LU\lambda_{W}<0.5K_{W}^{-2}LU and |𝐱|WKW|𝐱|WPW|\mathbf{x}|_{W}\leq K_{W}|\mathbf{x}|_{W}-P_{W}.

Now, applying Kingman’s moment-bound to (V-A) with f(𝐱)=KW1LU|𝐱|Wf(\mathbf{x})=K_{W}^{-1}LU|\mathbf{x}|_{W} and g(𝐱)=λ(KW+KW2)g(\mathbf{x})=\lambda(K_{W}+K_{W}^{2}) gives

𝔼ρ[|𝐱|W]λWKW2(KW+1)LU and\displaystyle\mathbb{E}_{\rho}[|\mathbf{x}|_{W}]\leq\frac{\lambda_{W}K_{W}^{2}(K_{W}+1)}{LU}\text{ and }
T¯WKW2(KW+1)LU=O(KW3).\displaystyle\overline{T}_{W}\leq\frac{K_{W}^{2}(K_{W}+1)}{LU}=O\left(K_{W}^{3}\right).

V-B High Load Regime 2\mathcal{L}_{2}

For regime 2\mathcal{L}_{2}, we have the following Lemma.

Lemma 6

For the single-swarm case of the multi-swarm model described in Section II, with swarm-based RFwPMS as the piece-selection policy, if the network parameters belong to 2\mathcal{L}_{2} and the empty-peers are always push-contacted in all tit-for-tat contacts, then the steady-state expected sojourn time T¯W\overline{T}_{W} is independent of λW\lambda_{W}. In particular, T¯W=O(KW6)\overline{T}_{W}=O(K_{W}^{6}) for βW=O(KW3)\beta_{W}=O(K_{W}^{-3}).

Proof:

Let

V2(𝐱)\displaystyle V_{2}(\mathbf{x}) =VW,1(𝐱)+VW,2(𝐱)\displaystyle=V_{W,1}(\mathbf{x})+V_{W,2}(\mathbf{x})
=((MWηc¯W)+)2+CW(1)(|𝐱|Wc¯W).\displaystyle=\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}+C_{W}^{(1)}\left(|\mathbf{x}|_{W}-\overline{c}_{W}\right).

The above function uses the terms VW,1V_{W,1} and VW,2V_{W,2} of VWV_{W} given in (27). Therefore, by ignoring the terms associated with VW,3(𝐱)V_{W,3}(\mathbf{x}) and noting that 𝒲={W}\mathcal{W}=\{W\}, (39), we get

QV2(𝐱)\displaystyle QV_{2}(\mathbf{x}) λWKWCW(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))ΨW(i)].\displaystyle\leq\lambda_{W}K_{W}C^{(1)}_{W}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\Psi_{W}^{(i)}\right].

Case 1 - 𝐱W2\mathbf{x}\in\mathcal{R}_{W}^{2}: Here,

QV2(𝐱)\displaystyle{QV}_{2}(\mathbf{x})
(d)λWKWCW(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(4KW2CW(1))]\displaystyle\stackrel{{\scriptstyle\textnormal{(d)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(4K_{W}^{2}-C^{(1)}_{W}\right)\right]
(e)λWKWCW(1)+Γ¯W(r¯)KW[(1π¯W)(0.5CW(1))]\displaystyle\stackrel{{\scriptstyle\textnormal{(e)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+\frac{\underline{\Gamma}_{W}^{(\underline{r})}}{K_{W}}\left[\left(1-\underline{\pi}_{W}\right)\left(-0.5C^{(1)}_{W}\right)\right]
(f)λWKWCW(1)+KW2Γ¯W(r¯)[0.5CW(1)]\displaystyle\stackrel{{\scriptstyle\textnormal{(f)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+K_{W}^{-2}\underline{\Gamma}_{W}^{(\underline{r})}\left[-0.5C^{(1)}_{W}\right]
(g)λWKWCW(1)0.5CW(1)KW2(LU+Δpc¯W)\displaystyle\stackrel{{\scriptstyle\textnormal{(g)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}-0.5C^{(1)}_{W}K_{W}^{-2}(LU+\Delta_{p}\underline{c}_{W})
(h)λWKWCW(1)0.5CW(1)KW2(LU+Δp(1η)(c¯W2))\displaystyle\stackrel{{\scriptstyle\textnormal{(h)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}-0.5C^{(1)}_{W}K_{W}^{-2}(LU+\Delta_{p}(1-\eta)(\overline{c}_{W}-2))
λWKWCW(1)(1η)KW2c¯W[0.5CW(1)Δp]\displaystyle\leq\lambda_{W}K_{W}C^{(1)}_{W}-(1-\eta)K_{W}^{-2}\overline{c}_{W}\left[0.5C^{(1)}_{W}\Delta_{p}\right]
+KW2(2(1η)ΔpLU)+[0.5CW(1)].\displaystyle\hskip 30.0pt+K_{W}^{-2}\left(2(1-\eta)\Delta_{p}-LU\right)^{+}\left[0.5C^{(1)}_{W}\right]. (45)

Here, (V-B) uses the definition of ΨW(i)\Psi_{W}^{(i)} (see (III-B4)); (V-B) uses CW(1)8KW2C^{(1)}_{W}\geq 8K_{W}^{2} and then upper-bounds the summation by considering only the rarest-piece, that is denoted by r¯\underline{r}; (V-B) uses 1π¯WKW11-\underline{\pi}_{W}\geq K_{W}^{-1} (Lemma 2); (V-B) uses Γ¯W(r¯)LU+Δpc¯W\underline{\Gamma}_{W}^{(\underline{r})}\geq LU+\Delta_{p}\underline{c}_{W} (see (18)); (V-B) uses c¯W>(1η)(c¯W2)\underline{c}_{W}>(1-\eta)(\overline{c}_{W}-2) because 𝐱W2\mathbf{x}\in\mathcal{R}_{W}^{2}.

Case 2 - 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1}: Here,

QV2(𝐱)\displaystyle{QV}_{2}(\mathbf{x})
(i)λWKWCW(1)+iWΓ¯W(r)aW(i)KW[(1πW(i))\displaystyle\stackrel{{\scriptstyle\textnormal{(i)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(r)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
×(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1))]\displaystyle\hskip 10.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}\right)\right]
(j)λWKWCW(1)+nRWcΓ¯W(n)ζW(n)KW[(1π¯W)KWξ2ψ¯W]\displaystyle\stackrel{{\scriptstyle\textnormal{(j)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)K_{W}\xi_{2}\overline{\psi}_{W}\right]
+rRWΓ¯W(r)KW[(1πW(r))(ψ¯WCW(1))]\displaystyle\hskip 10.0pt+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\left(\underline{\psi}_{W}-C^{(1)}_{W}\right)\right]
(k)λWKWCW(1)+DW(1)+rRWΓ¯W(r)KW[(1πW(r))ψ¯WCW(1)]\displaystyle\stackrel{{\scriptstyle\textnormal{(k)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+D_{W}^{(1)}+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\underline{\psi}_{W}-C^{(1)}_{W}\right]
(l)λWKWCW(1)+DW(1)\displaystyle\stackrel{{\scriptstyle\textnormal{(l)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+D_{W}^{(1)}
2(1η)KW2[2(1η)(LU2(1η)Δp)\displaystyle\hskip 10.0pt-2(1-\eta)K_{W}^{-2}\left[2(1-\eta)\left(LU-2(1-\eta)\Delta_{p}\right)\right.
+((KWη)c¯Wir¯cW(i))(LU2(1η)Δp)]\displaystyle\hskip 20.0pt\left.+\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\right)(LU\wedge 2(1-\eta)\Delta_{p})\right]
(m)λWKWCW(1)+DW(1)\displaystyle\stackrel{{\scriptstyle\textnormal{(m)}}}{{\mathstrut{\leq}}}\lambda_{W}K_{W}C^{(1)}_{W}+D_{W}^{(1)}
2(1η)KW2[2(1η)(LU2(1η)Δp)\displaystyle\hskip 10.0pt-2(1-\eta)K_{W}^{-2}\left[2(1-\eta)\left(LU-2(1-\eta)\Delta_{p}\right)\right.
+(1η)c¯W(LU2(1η)Δp)]\displaystyle\hskip 80.0pt\left.+(1-\eta)\overline{c}_{W}(LU\wedge 2(1-\eta)\Delta_{p})\right]
=λWKWCW(1)+DW(1)\displaystyle=\lambda_{W}K_{W}C^{(1)}_{W}+D_{W}^{(1)}
(1η)KW2c¯W[2(1η)(LU2(1η)Δp)]\displaystyle\hskip 10.0pt-(1-\eta)K_{W}^{-2}\overline{c}_{W}\left[2(1-\eta)\left(LU\wedge 2(1-\eta)\Delta_{p}\right)\right]
+KW2(2(1η)ΔpLU)+[4(1η)2].\displaystyle\hskip 20.0pt+K_{W}^{-2}\left(2(1-\eta)\Delta_{p}-LU\right)^{+}\left[4(1-\eta)^{2}\right].

Here, (V-B) uses the definition of ΨW(i)\Psi_{W}^{(i)} (see (III-B4)); (V-B) uses CW(1)0C^{(1)}_{W}\geq 0; (V-B) follows from Lemma 9; (V-B) follows from Lemma 13; (V-B) uses cW(i)c¯Wc^{(i)}_{W}\leq\overline{c}_{W}.

Combining (45) and (45), we get

QV2(𝐱)λWKWCW(1)+DW(1)\displaystyle{QV}_{2}(\mathbf{x})\leq\lambda_{W}K_{W}C^{(1)}_{W}+D_{W}^{(1)}
+KW2(2(1η)ΔpLU)+(0.5CW(1)+4(1η)2)\displaystyle\hskip 10.0pt+K_{W}^{-2}\left(2(1-\eta)\Delta_{p}-LU\right)^{+}\left(0.5C^{(1)}_{W}+4(1-\eta)^{2}\right)
KW2(1η)c¯Wmin{0.5CW(1)Δp,2(1η)LU,\displaystyle\hskip 20.0pt-K_{W}^{-2}(1-\eta)\overline{c}_{W}\min\left\{0.5C^{(1)}_{W}\Delta_{p},2(1-\eta)LU,\right.
4(1η)2Δp}\displaystyle\hskip 140.0pt\left.4(1-\eta)^{2}\Delta_{p}\right\}
(n)8λWKW3+DW(1)+5(2(1η)ΔpLU)+\displaystyle\stackrel{{\scriptstyle\textnormal{(n)}}}{{\mathstrut{\leq}}}8\lambda_{W}K_{W}^{3}+D_{W}^{(1)}+5\left(2(1-\eta)\Delta_{p}-LU\right)^{+}
2(1η)2KW2c¯Wmin{LU,2(1η)Δp}.\displaystyle\hskip 20.0pt-2(1-\eta)^{2}K_{W}^{-2}\overline{c}_{W}\min\{LU,2(1-\eta)\Delta_{p}\}. (46)

Here, (V-B) follows from choosing CW(1)=8KW2C^{(1)}_{W}=8K_{W}^{2} and using 4(1η)2KW24(1-\eta)^{2}\leq K_{W}^{2}.

Applying Kingman’s moment bound to (46) with f(𝐱)=2(1η)2KW2min{LU,2(1η)Δp}c¯Wf(\mathbf{x})=2(1-\eta)^{2}K_{W}^{-2}\min\{LU,2(1-\eta)\Delta_{p}\}\overline{c}_{W} and g(𝐱)=8λWKW3+DW(1)+5(2(1η)ΔpLU)+g(\mathbf{x})=8\lambda_{W}K_{W}^{3}+D_{W}^{(1)}+5\left(2(1-\eta)\Delta_{p}-LU\right)^{+}, we get

𝔼ρ[|𝐱|WxW](o)𝔼ρ[PW]KW𝔼ρ[c¯W]\displaystyle\mathbb{E}_{\rho}[|\mathbf{x}|_{W}-x_{W}^{\emptyset}]\stackrel{{\scriptstyle\textnormal{(o)}}}{{\mathstrut{\leq}}}\mathbb{E}_{\rho}[P_{W}]\leq K_{W}\mathbb{E}_{\rho}[\overline{c}_{W}]
(8λWKW3+5(2(1η)ΔpLU)++DW(1))KW32(1η)2min{LU,2(1η)Δp}\displaystyle\leq\frac{\left(8\lambda_{W}K_{W}^{3}+5\left(2(1-\eta)\Delta_{p}-LU\right)^{+}+D_{W}^{(1)}\right)K_{W}^{3}}{2(1-\eta)^{2}\min\{LU,2(1-\eta)\Delta_{p}\}}
=KW3(8λWKW3+5(2(1η)ΔpLU)+)+DW(1)KW32(1η)2min{LU,2(1η)Δp}.\displaystyle=\frac{K_{W}^{3}\left(8\lambda_{W}K_{W}^{3}+5\left(2(1-\eta)\Delta_{p}-LU\right)^{+}\right)+D_{W}^{(1)}K_{W}^{3}}{2(1-\eta)^{2}\min\{LU,2(1-\eta)\Delta_{p}\}}.

Here, (V-B) uses the fact that each non-empty peer must possess at least one piece of the file.

Now, we divide the single-swarm system into two subsystems; one with empty-peers and the other with peers who hold some piece of WW. The two subsystems are connected in tandem as shown in Figure4.

Refer to caption
Figure 4: Subsystems 1 and 2 in Tandem (Single-Swarm Version of the Multi-swarm Model described in Section II).

Only the empty peers arrive in subsystem-1, so the arrival rate in subsystem-1 is λW\lambda_{W}. Since both systems are stable in steady-state, the departure rate of subsystem-1 (which is also the arrival rate of subsystem 2) and the departure rate of subsystem-2 are λW\lambda_{W}. Let T¯W,1\overline{T}_{W,1} and T¯W,2\overline{T}_{W,2} denote the steady-state expected sojourn-times in subsystems 1 and 2 respectively, so that by Little’s Law, 𝔼ρ[|𝐱|W]=λW(T¯W,1+T¯W,2)\mathbb{E}_{\rho}\left[|\mathbf{x}|_{W}\right]=\lambda_{W}\left(\overline{T}_{W,1}+\overline{T}_{W,2}\right). Under swarm based RFwPMS, consider two situations – one in which a (W,S)(W,S)-peer contacts a (W,T)(W,T) peer where TT\neq\emptyset and the other in which it contacts a (W,)(W,\emptyset) peer. Then under the assumption, that empty-peers are always push-contacted, (W,S)(W,S) peer will push-contact (W,)(W,\emptyset) peer with probability 1. This combined with the fact that STSS\setminus T\subseteq S\setminus\emptyset ensures that the probability of an empty-peer downloading a piece in the next state transition is always lower-bounded by that of a peer from subsystem-2. Thus, T¯W,1T¯W,2\overline{T}_{W,1}\leq\overline{T}_{W,2}, which gives

𝔼ρ[|𝐱|W]2λWT¯W,2=2𝔼[|𝐱|WxW], and\displaystyle\mathbb{E}_{\rho}[|\mathbf{x}|_{W}]\leq 2\lambda_{W}\overline{T}_{W,2}=2\mathbb{E}[|\mathbf{x}|_{W}-x_{W}^{\emptyset}],\text{ and}
T¯WKW3(8KW3+5λW1(2(1η)ΔpLU)+)(1η)2min{LU,2(1η)Δp}\displaystyle\overline{T}_{W}\leq\frac{K_{W}^{3}\left(8K_{W}^{3}+5\lambda_{W}^{-1}\left(2(1-\eta)\Delta_{p}-LU\right)^{+}\right)}{(1-\eta)^{2}\min\{LU,2(1-\eta)\Delta_{p}\}}
+λW1DW(1)KW3(1η)2min{LU,2(1η)Δp}.\displaystyle\hskip 40.0pt+\frac{\lambda_{W}^{-1}D_{W}^{(1)}K_{W}^{3}}{(1-\eta)^{2}\min\{LU,2(1-\eta)\Delta_{p}\}}.

Using λW0.5KW2LU\lambda_{W}\geq 0.5K_{W}^{-2}LU, the fact that DW(1)D_{W}^{(1)} is O(βW2KW7)O(\beta_{W}^{2}K_{W}^{7}) from (41), and the choice of βW=O(KW3)\beta_{W}=O(K_{W}^{-3}), we get

T¯W=O(KW6).\displaystyle\overline{T}_{W}=O\left(K_{W}^{6}\right).

This establishes scalability. ∎

VI Simulation Based Performance Evaluation

Next, we investigate the stability, scalability and sojourn time performance of RFwPMS via numerical simulations. Since our stability result holds for any number of swarms, we will evaluate performance in both single-swarm and multi-swarm settings. Unless otherwise noted, in all cases, we set αW\alpha_{W} to 10910^{-9} and βW\beta_{W} to 1.51.5. Furthermore, the tabulated steady-state sojourn times are based on samples taken after the simulated Markov-Chain hit stationarity (simulation run-times were chosen long enough to collect sufficiently large number of samples from the stationary distribution).

VI-A Stability Check

We illustrate the stability of RFwPMS by simulating four instances of a two-swarm network with the setting of “hard tit-for-tat (p=0p=0) and opportunistic-unchoking (Yopt=1Y_{opt}=1)” – the four instances correspond to altruistic, opportunistic, selfish, and autonomous inter-swarm behaviors. In each instance, the network consists of a master-file \mathcal{F} of 25 pieces, i.e., =[25]\mathcal{F}=[25]. The two swarms entering the network are denoted by W1W_{1} and W2W_{2}, each having a peer-arrival rate of 20. Peers from swarm-W1W_{1} wish to download file W1=[15]W_{1}=[15] whereas those from swarm-W2W_{2} are interested in file W2=[10,25]W_{2}=[10,25]. We initiate the network in a state where both swarms are in the one-club scenario: both have 500 peers with all in swarm-W1W_{1} missing piece 1 and all in swarm-W2W_{2} missing piece 6. For the autonomous case, the seed’s upload capacity is divided evenly among the two swarms, i.e., (UW1,UW2)=(0.5,0.5)(U_{W_{1}},U_{W_{2}})=(0.5,0.5).

Figure5 shows the evolution of the swarm populations for the four inter-swarm behaviors. It is observed that each swarm is able to escape the one-club in finite time, after which a stable regime persists with minimal fluctuations. In the case of altruistic and opportunistic swarms, the population of swarm-W2W_{2} suddenly drops in the beginning. This is because piece 6, which is missing in swarm-W2W_{2}, is widely available in swarm-W1W_{1}; due to altruism of swarm-W1W_{1} peers, the one-club peers in swarm-W2W_{2} quickly grab piece 6 and leave the network. In the opportunistic case, the population of swarm-W2W_{2} increases almost linearly after the big initial drop. This is because once most of the one-club peers in swarm-W2W_{2} have left, the network is dominated by swarm-W1W_{1} peers. Therefore, most of the contacts of the new-comers in swarm-W2W_{2} are with swarm-W1W_{1} peers. Since the files are not identical, these new-comers cannot accumulate all pieces from swarm-W1W_{1} peers and are forced to linger in the system – till swarm-W1W_{1}’s population reduces enough and they get an opportunity for a useful contact.

Refer to caption
(a) Altruistic Swarms.
Refer to caption
(b) Opportunistic Swarms.
Refer to caption
(c) Selfish Swarms.
Refer to caption
(d) Autonomous Swarms
Figure 5: Stability-check of RFwPMS in a Two-Swarm network for different inter-swarm behaviors. The primary files were W1=[15]W_{1}=[15] and W2=[10,25]W_{2}=[10,25] and the master-file was set to their union. Assignment of remaining model parameters was U=μ=1U=\mu=1, μ^=13\widehat{\mu}=\frac{1}{3}, L=3L=3, p=0p=0, Yopt=1Y_{opt}=1. In the case of autonomous-swarms, the seed’s upload capacity was divided equally among the swarms.

VI-B Scalability Check

Here, we simulate twelve instances of a two-swarm network with the setting of “soft tit-for-tat (choice of p=0.5p=0.5) and no optimistic-unchoking (Yopt=0Y_{opt}=0)”. In each instance, the network’s master-file comprises of 18 pieces (=[18]\mathcal{F}=[18]) and the two swarms entering the network are interested in files W1=[10]W_{1}=[10] and W2=[8,18]W_{2}=[8,18]. The twelve instances correspond to four inter-swarm behaviors (altruistic, opportunistic, selfish, and autonomous) and three arrival-rate configurations (𝝀=(4,2)\bm{\lambda}=(4,2), 4𝝀4\bm{\lambda} and 16𝝀16\bm{\lambda}). For the autonomous case, the seed’s upload capacity is again split equally between the two swarms.

Table II lists the (steady-state) expected sojourn times for the twelve model instances. We note that the expected sojourn time practically stays constant in all the four inter-swarm behaviors and improves as swarms interact more altruistically. Another observation is that the autonomous setting has lower expected sojourn times than the altruistic setting. This is not unexpected though; in autonomous setting, every peer makes contacts within their own swarm (no inter-swarm interactions), thus the likelihood that the next contact is useless is lower.

TABLE II: Expected Steady-State Sojourn Times for Different Arrival Rate Vectors. (U=μ=1,μ^=13,L=3,p=0.5,Yopt=0U=\mu=1,\widehat{\mu}=\frac{1}{3},L=3,p=0.5,Y_{opt}=0).
Swarms’ Arrival 𝔼[Sojourn Time]\mathbb{E}[\textbf{Sojourn Time}]
Behavior Ratesa W1=[10]W_{1}=[10] W2=[8,18]W_{2}=[8,18]
Altruistic 𝝀\bm{\lambda} 2.9272.927 4.4004.400
4𝝀4\bm{\lambda} 3.0883.088 3.9903.990
16𝝀16\bm{\lambda} 3.1343.134 3.9713.971
Opportunistic 𝝀\bm{\lambda} 3.7043.704 5.0425.042
4𝝀4\bm{\lambda} 3.8323.832 5.3415.341
16𝝀16\bm{\lambda} 3.9563.956 5.5705.570
Selfish 𝝀\bm{\lambda} 4.3784.378 6.3946.394
4𝝀4\bm{\lambda} 4.5904.590 6.4826.482
16𝝀16\bm{\lambda} 4.6674.667 6.6046.604
Autonomous 𝝀\bm{\lambda} 2.7912.791 3.7693.769
4𝝀4\bm{\lambda} 2.7122.712 2.6672.667
16𝝀16\bm{\lambda} 2.7882.788 2.7402.740
𝝀a=(4,2){}^{\mathrm{a}}\bm{\lambda}=(4,2). Simulation End-time: 1000 units

VI-C Sojourn Time Performance in the presence of Multiple Swarms

How does the expected steady-state sojourn time scale with the file-size is another important performance measure. For this, we obtained an upper-bound estimate of O(KW6)O(K_{W}^{6}) in Section V. Here, in Figure6 we verify this for a two-swarm network in a soft tit-for-tat setting (choice of p=0.5p=0.5) with optimistic-unchoke (Yopt=1Y_{opt}=1) – once again, under the four different inter-swarm behaviors.191919The error-bars for confidence intervals are not shown due to their negligible magnitude (even with a choice of 99.9 percent confidence level).

Fixing the arrival-rate vector to 𝝀=(6,2)\bm{\lambda}=(6,2), increasing configurations of the two file-sizes were simulated such that for every choice of W1=[KW1]W_{1}=[K_{W_{1}}], we set W2W_{2} to [12KW1,32KW1][\frac{1}{2}K_{W_{1}},\frac{3}{2}K_{W_{1}}]. (Again the seed’s upload capacity was split evenly in the autonomous case). The sojourn-times for each swarm are observed to scale linearly with the file-size. Additionally, we note that for each swarm, the altruistic and autonomous cases are Pareto better than opportunistic and selfish cases.

Refer to caption
(a) Expected Sojourn Times of Swarm-1.
Refer to caption
(b) Expected Sojourn Times of Swarm-2.
Figure 6: Expected steady-state sojourn times vs file-sizes. Figure6a shows the expected sojourn times of swarm-1 and Figure6b shows those of swarm-2. Assignment of remaining model parameters was 𝝀=(6,2)\bm{\lambda}=(6,2), U=μ=1U=\mu=1, μ^=13\widehat{\mu}=\frac{1}{3}, L=3L=3, p=0.5p=0.5, Yopt=1Y_{opt}=1.

VI-D RFwPMS and Mode Suppression

Via simulations MS [11] has been shown to outperform other previously proposed piece-selection policies. Here, we do a base-line comparison of RFwPMS and MS in a single-swarm network.

VI-D1 Expected Steady-State Sojourn Times

Table III compares the expected steady-state sojourn times of RFwPMS, MS, and TMS202020Threshold Mode-Suppression with suppression-threshold set to 2KW2K_{W}. for different values of file-size KWK_{W} with the arrival-rate fixed at λW=4\lambda_{W}=4. It is noted that using RFwPMS (with βW=1.5\beta_{W}=1.5), the expected sojourn time is indeed reduced compated to MS. This reduction is not expected to be significant when KK is large (roughly 100100 or more) as the increased chunk diversity in steady-state reduces the number of contacts in which only the non-rare pieces are offered. The steady-state sojourn-times of RFwPMS and TMS, on the other hand, are comparable for all values of KK.

TABLE III: Expected Steady-State Sojourn Times for RFwPMS and MS. (λW=4,U=μ^=L=Yopt=1,βW=1.7\lambda_{W}=4,U=\widehat{\mu}=L=Y_{opt}=1,\beta_{W}=1.7).
KWK_{W} 𝔼[Sojourn Time]\mathbb{E}[\textbf{Sojourn Time}] Perc. Improv.
MS TMS RFwPMS over MS
22 6.2466.246 5.0225.022 5.1785.178 17.10317.103
1010 18.25018.250 12.54612.546 12.52512.525 31.36731.367
2020 31.74131.741 23.02023.020 23.05823.058 27.35627.356
4040 55.64855.648 43.77543.775 43.75043.750 21.38221.382
8080 100.300100.300 84.37484.374 84.42184.421 15.83115.831
100100 121.804121.804 104.849104.849 104.610104.610 14.11614.116
200200 226.998226.998 205.300205.300 205.176205.176 9.6139.613
500500 533.737533.737 506.480506.480 506.351506.351 5.1315.131
Simulation End-time: 5000 units

VI-D2 Flash-Crowd Responses

Refer to caption
(a) Number of Peers vs. Time.
Refer to caption
(b) Chunk-counts vs Time.
Figure 7: Flash-crowd responses of MS, RNwPMS, TMS, and RFwPMS when flash-crowd size is much larger than file-size. Initial population and file-size were set to 500 and 100 respectively. Assignment of other model parameters was λW=0\lambda_{W}=0, U=μ^=1U=\widehat{\mu}=1 L=Yopt=1L=Y_{opt}=1).

Real torrents seldom experience steady-state behavior as the arrival-rates vary over time with intermittent bursts of empty peers. Fig. 7 compares the flash-crowd response of MS, TMS, RFwPMS, and RNwPMS (replacing RF by RN in our policy) for KW=100K_{W}=100 (“large") and an initial population of 500 empty peers (|𝐱|W(0)=xW(ϕ)KW|\mathbf{x}|_{W}(0)=x_{W}^{(\phi)}\gg K_{W}); RFwPMS flushes out the system in the least amount of time (about half the time as MS) whereas RNwPMS takes the most amount of time (see Figure7a). The reason behind such responses can be understood from Figure7b. Initially there are no pieces in the system and therefore the time till all KWK_{W} pieces are introduced into the system depends solely on the seed’s uploading capacity which is set to 1. Thus, for every policy, if KWK_{W} is sufficiently large, it will take on average KWK_{W} time units till every piece has been introduced into the system (see Fig. 7b). MS forbids the download of non-rare pieces. Thus, there is exactly one copy of each piece when the seed has introduced the last piece into the system. After that, the number of copies of the non-rare piece and the rarest-piece go hand-in-hand with at most a difference of 1. TMS, on the other hand, allows the download of non-rare pieces till their chunk-count equals the threshold (twice the size of the file). After that, no peer is allowed to download those pieces. Therefore, by the time, the last piece is introduced into the system, there are many peers who have yet to download a large number of pieces to depart.

Comparing with MS and TMS, both RFwPMS and RNwPMS allow the (probabilistic) download of non-rare pieces and since KWK_{W} is sufficiently large, by the time the last KWthK_{W}^{\mathrm{th}} piece is introduced into the system, the largest mismatch m¯W\underline{m}_{W} has increased considerably coupled with proportional decrease in ζW\zeta_{W}. At this point, the largest mismatch is very large, but owing to the rarest-first mechanism, RFwPMS quickly stabilizes the largest mismatch by giving preference to the rarest of all available rare pieces in all peer encounters. On the other hand, RNwPMS does not consider the frequency differences of the rare pieces. Thus, if KWK_{W} is sufficiently large, the system is likely to get trapped in a one-club type state where almost all peers have all the pieces except the rarest one. Once this happens, only the seed can flush such peers from the system, which leads to a larger file-delivery time than that of MS.

Refer to caption
(a) RFwPMS.
Refer to caption
(b) MS.
Figure 8: Flash-crowd responses of RFwPMS and MS when file-size is much larger than flash-crowd. Initial population and file-size were set to 100 and 600 respectively. Assignment of other model-parameters was λW=0\lambda_{W}=0, U=13U=\frac{1}{3}, μ=μ^=1\mu=\widehat{\mu}=1, L=3L=3, p=0.5p=0.5, Yopt=1Y_{opt}=1.
Refer to caption
(a) βW=0.5\beta_{W}=0.5.
Refer to caption
(b) βW=0.4\beta_{W}=0.4.
Refer to caption
(c) βW=0.2\beta_{W}=0.2.
Figure 9: Flash-crowd response of RFwPMS when file-size is much larger than flash-crowd. The non-rares’ sharing factor given by (47) was used with three different choices of βW\beta_{W}. Mode parameters were the same as given in the caption of Figure8.

It is worth noting that RFwPMS can also get trapped in such one-club like states. This is specially true when the file-size KWK_{W} is much larger than the size of the flash-crowd (KW|𝐱W|(0)=xW(ϕ)(0)K_{W}\gg|\mathbf{x}_{W}|(0)=x_{W}^{(\phi)}(0)). As an example, Figure8a shows such a flash-crowd situation in which RFwPMS gets locked into the one-club like state, whereas MS, like before, avoids this (Figure8b). (Note that the flush-out time of MS is still larger than RFwPMS). The locking-in of RFwPMS in this one-club like state is because the non-rares’ sharing factor ζW\zeta_{W} defined in (15) suppresses non-rare pieces via the ratio of the (largest) mismatch to the file-size. Since the mismatch is upper-bounded by the network-population (which in this case is much smaller than KWK_{W}), the suppression is simply not small enough to avoid the download of non-rare pieces.212121This locking-in of RFwPMS would still occur if we suppress each piece ii through the ratio cW(i)c¯WKW\frac{c^{(i)}_{W}-\underline{c}_{W}}{K_{W}}. This observation while simple is worth noting as it is reflective of what should happen in practice. Usually files shared over such networks would have chunk-sizes much larger than the size of the flash-crowd. In such transient situations, to obtain a good trade-off between suppression and sharing, it would make sense to have a non-rares’ sharing factor that takes into account the flash-crowd size (besides network’s parameters and the file-size). One way we could choose a ζW\zeta_{W} that can work for both types of flash-crowds would be to replace it by

exp(Δ1βWLUm¯W+dW(i)min{KW,|𝐱|}).\displaystyle\exp\left(-\frac{\Delta_{1}}{\beta_{W}LU}\frac{\overline{m}_{W}+d^{(i)}_{W}}{\min\{K_{W},|\mathbf{x}|\}}\right). (47)

To this end, Figure9 shows the flash-crowd response of RFwPMS for the aforementioned choice of ζW\zeta_{W} with different values of β\beta namely 0.20.2, 0.40.4, and 0.50.5. When βW\beta_{W} is set to 0.4, it seems to replicate the response of RFwPMS in Figure7b and attains the least flush-out time.

VII Conclusions

In this work, we proposed and studied a piece-selection policy, (swarm-based) RFwPMS, for a BitTorrent-like P2P network with multiple swarms of non-persistent users. RFwPMS combines rarest-first (for rare pieces) with an adjustable sharing-versus-suppression choice for non-rare pieces. Using Lyapunov drift analysis, we proved the stability of RFwPMS in a multi-swarm setting, independent of how peers use their excess cache, and whether or not swarms collaborate with each other. By using the Kingman’s moment bound technique, we established the scalability of RFwPMS in the single-swarm case. Our numerical simulations also demonstrated evidence that RFwPMS can reduce the steady-state expected sojourn times as well as file-delivery times during a flash-crowd. From our numerical experiments, we note the following: In the setting of non-persistent peers, the question of complete vs partial suppression makes sense for both steady-state and flash-crowd performance. In high arrival rate regime, the difference between the two in terms of average file-download times diminishes due to wide variety of chunk-profiles. On the other hand, in low arrival-rate regime, a fine choice of partial suppression that keeps into account the network population would lead to better file-download times.

Lastly, since RFwPMS uses rarest-first with a minor modification (use of the non-rares’ sharing factor), it is amenable to be incorporated into BitTorrent-like protocols.

In regards to future-work, proving (or disproving) Conjecture 1 and establishing the scalability of RFwPMS in the multi-swarm case are interesting directions to explore.

Appendix A Two-sided Piece Exchanges in the Same Swarm

Here, we consider the event that both (W,S)(W,S) and (W,T)(W,T) peers download pieces ii and jj respectively.

A-A Change in VW,1V_{W,1}

Case 1: Both ii and jj are swarm-WW’s non-rare pieces: If both peers remain in the system, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} increase by 1; cW(i)c^{(i^{\prime})}_{W} stays the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If both peers depart, c¯W\overline{c}_{W}, cW(i)c^{(i)}_{W}, cW(j)c^{(j)}_{W} decrease by 1; cW(i)c^{(i^{\prime})}_{W} decreases by 2 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If one peer departs and the other stays, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} stay the same; cW(i)c^{(i^{\prime})}_{W} decreases by 1 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. Overall, in all cases, the total mismatch MWM_{W} increases by KW2K_{W}-2 and the highest chunk-count reduces by at most 1. Overall, this causes an increment of at most KW2+ηWKWK_{W}-2+\eta_{W}\leq K_{W} in MWηc¯WM_{W}-\eta\overline{c}_{W}. Therefore,

ΔVW,1{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,1}^{\{(S,i\pm),(T,j\pm)\}}
((MWηc¯W+KW)+)2((MWηc¯W)+)2\displaystyle\leq\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
ψ¯W2ψ¯W.\displaystyle\leq\overline{\psi}_{W}\leq 2\overline{\psi}_{W}.

Case 2A - ii and jj are swarm-WW’s rare-pieces and 𝐱𝒮W1\mathbf{x}\in\mathcal{S}_{W}^{1}: If both peers remain in the system, c¯W\overline{c}_{W} stays the same; cW(i)c^{(i)}_{W}, cW(j)c^{(j)}_{W} increase by 1; cW(i)c^{(i^{\prime})}_{W} stays the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If both peers depart the system, c¯W\overline{c}_{W} decreases by 2; cW(i)c^{(i)}_{W} and cW(j)c^{(j)}_{W} each decrease by 1; cW(i)c^{(i^{\prime})}_{W} also decreases by 2 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If one peer departs and the other stays, c¯W\overline{c}_{W} and cW(i)c^{(i^{\prime})}_{W} (iW{i,j}i^{\prime}\in W\setminus\{i,j\}) decrease by 1; cW(i)c^{(i)}_{W} and cW(j)c^{(j)}_{W} remain the same. Overall, in all cases, the total mismatch MWM_{W} reduces by 2 and c¯W\overline{c}_{W} decreases by 2 at most. Therefore,

ΔVW,1{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,1}^{\{(S,i\pm),(T,j\pm)\}}
((MWηc¯W2(1η))+)2((MWηc¯W)+)2\displaystyle\leq\left(\left(M_{W}-\eta\overline{c}_{W}-2(1-\eta)\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
={2[2(1η)22(1η)(MWηc¯W)]if MW2(1η)+ηc¯W0otherwise.\displaystyle=\begin{cases}2\left[2(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)\right]&\begin{array}[]{@{}l@{}}\text{if $M_{W}\geq$}\\ 2(1-\eta)+\eta\overline{c}_{W}\end{array}\\ 0&\text{otherwise}.\end{cases}
2ψ¯W.\displaystyle\leq 2\underline{\psi}_{W}.

Case 2B - ii and jj are swarm-WW’s rare-pieces and 𝐱𝒮W2\mathbf{x}\in\mathcal{S}_{W}^{2}: If both peers remain in the system, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} increase by 1; cW(i)c^{(i^{\prime})}_{W} remains the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If both peers depart the system, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} decrease by 1; cW(i)c^{(i^{\prime})}_{W} decreases by 2 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If one peer departs and the other stays, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} stay the same; cW(i)c^{(i^{\prime})}_{W} decreases by 1 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. Overall, in all cases, the total mismatch MWM_{W} increases from 0 to KW2K_{W}-2 and c¯W\overline{c}_{W} decreases by at most 1. Therefore,

ΔVW,1{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,1}^{\{(S,i\pm),(T,j\pm)\}}
((KW2+ηηc¯W)+)2((ηc¯W)+)2\displaystyle\leq\left(\left(K_{W}-2+\eta-\eta\overline{c}_{W}\right)^{+}\right)^{2}-\left(\left(-\eta\overline{c}_{W}\right)^{+}\right)^{2}
(KW+2)22(KW+2)22ψ¯W.\displaystyle\leq(K_{W}+2)^{2}\leq 2(K_{W}+2)^{2}\leq 2\underline{\psi}_{W}.

Case 3 - ii is a rare-piece and jj a non-rare piece: If both peers stay in the system, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} increase by 1; cW(i)c^{(i^{\prime})}_{W} stays the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If both peers depart, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} decrease by 1; cW(i)c^{(i^{\prime})}_{W} decreases by 2 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If one peer departs and the other stays, c¯W,cW(i),cW(j)\overline{c}_{W},c^{(i)}_{W},c^{(j)}_{W} stay the same; cW(i)c^{(i^{\prime})}_{W} decreases by 1 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. Overall, in all cases, the total mismatch MWM_{W} increases by KW2K_{W}-2 and c¯W\overline{c}_{W} decreases by at most 1. Therefore,

ΔVW,1{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,1}^{\{(S,i\pm),(T,j\pm)\}}
=((MWηc¯W+KW2+η)+)2((MWηc¯W)+)2\displaystyle=\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}-2+\eta\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
(p)((MWηc¯W+KW1)+)2((MWηc¯W)+)2\displaystyle\stackrel{{\scriptstyle\textnormal{(p)}}}{{\mathstrut{\leq}}}\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}-1\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
(q)((MWηc¯W+KW)+)2((MWηc¯W)+)2\displaystyle\stackrel{{\scriptstyle\textnormal{(q)}}}{{\mathstrut{\leq}}}\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
+((MWηc¯W1)+)2((MWηc¯W)+)2\displaystyle+\left(\left(M_{W}-\eta\overline{c}_{W}-1\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
(r)((MWηc¯W+KW)+)2((MWηc¯W)+)2\displaystyle\stackrel{{\scriptstyle\textnormal{(r)}}}{{\mathstrut{\leq}}}\left(\left(M_{W}-\eta\overline{c}_{W}+K_{W}\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
+((MWηc¯W(1η))+)2((MWηc¯W)+)2\displaystyle+\left(\left(M_{W}-\eta\overline{c}_{W}-(1-\eta)\right)^{+}\right)^{2}-\left(\left(M_{W}-\eta\overline{c}_{W}\right)^{+}\right)^{2}
ψ¯W+ψ¯W.\displaystyle\leq\overline{\psi}_{W}+\underline{\psi}_{W}.

Here, step (A-A) uses η<1\eta<1; (A-A) uses η>0\eta>0; step (A-A) uses the inequality

((x+a)+)2((x)+)2((x+1+a)+)2((x)+)2\displaystyle\left((x+a)^{+}\right)^{2}-\left((x)^{+}\right)^{2}\leq\left((x+1+a)^{+}\right)^{2}-\left((x)^{+}\right)^{2}
+((x1)+)2((x)+)2 for all x,a0.\displaystyle+\left((x-1)^{+}\right)^{2}-\left((x)^{+}\right)^{2}\text{ for all $x\in\mathbb{R},a\geq 0$}.

The case when ii is a non-rare piece and jj is a rare piece is similar.

The above inequalities ensure that we can write

ΔVW,1{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,1}^{\{(S,i\pm),(T,j\pm)\}} i=i,jψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}.\displaystyle\leq\sum_{i^{\prime}=i,j}\overline{\psi}_{W}\mathbbm{1}{\{i^{\prime}\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i^{\prime}\in R_{W}\}}. (A.48)

A-B Change in VW,2V_{W,2}

For VW,2V_{W,2}, note that KW|𝐱|WPW=iW|𝐱|WcW(i)K_{W}|\mathbf{x}|_{W}-P_{W}=\sum_{i\in W}|\mathbf{x}|_{W}-c^{(i)}_{W}. If both peers stay in the system, |𝐱|W|\mathbf{x}|_{W} stays the same; cW(i),cW(j)c^{(i)}_{W},c^{(j)}_{W} increase by 1; cW(i)c^{(i^{\prime})}_{W} stays the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If both peers depart, |𝐱|W|\mathbf{x}|_{W} decreases by 2; cW(i),cW(j)c^{(i)}_{W},c^{(j)}_{W} decrease by 1; cW(i)c^{(i^{\prime})}_{W} decrease by 2 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. If one peer leaves and the other departs; |𝐱|W|\mathbf{x}|_{W} decreases by 1; cW(i),cW(j)c^{(i)}_{W},c^{(j)}_{W} stay the same; cW(i)c^{(i^{\prime})}_{W} decreases by 1 for all iW{i,j}i^{\prime}\in W\setminus\{i,j\}. In all cases, the deficit |𝐱|WcW(i)|\mathbf{x}|_{W}-c^{(i^{\prime})}_{W} stays the same for all iW{i,j}i^{\prime}\in W\setminus\{i,j\} and decreases by 1 for i{i,j}i^{\prime}\in\{i,j\}. Thus, we can write

ΔVW,2{(S,i±),(T,j±)}\displaystyle{\Delta V}_{W,2}^{\{(S,i\pm),(T,j\pm)\}} =2CW(2).\displaystyle=-2C^{(2)}_{W}. (A.49)

A-C Change in VW,3V_{W,3}

The change in VW,3V_{W,3} depends on whether peers depart or not, and does not depend on the type of ii and jj. There are three cases. If both peers stay in the system, PWP_{W} increases by 2. Therefore,

ΔVW,3{(S,i+),(T,j+)}\displaystyle{\Delta V}_{W,3}^{\{(S,i+),(T,j+)\}} 2CW(2)𝟙{CW(3)2PW}=2IW(1).\displaystyle\leq-2C^{(2)}_{W}\mathbbm{1}{\{C_{W}^{(3)}-2\geq P_{W}\}}=-2I_{W}^{(1)}. (A.50)

If only one of the two peers depart, then PWP_{W} decreases by KW2K_{W}-2. Therefore,

ΔVW,3{(S,i+/),(T,j/+)}\displaystyle{\Delta V}_{W,3}^{\{(S,i+/-),(T,j-/+)\}}
CW(2)(KW2)𝟙{CW(3)+KW2PW}\displaystyle\leq C^{(2)}_{W}(K_{W}-2)\mathbbm{1}{\{C_{W}^{(3)}+K_{W}-2\geq P_{W}\}}
CW(2)KW𝟙{CW(3)+2KWPW}CW(2)𝟙{CW(3)2PW}\displaystyle\leq C^{(2)}_{W}K_{W}\mathbbm{1}\{C_{W}^{(3)}+2K_{W}\geq P_{W}\}-C^{(2)}_{W}\mathbbm{1}\{C_{W}^{(3)}-2\geq P_{W}\}
=IW(2)IW(1).\displaystyle=I_{W}^{(2)}-I_{W}^{(1)}. (A.51)

If both peers depart the system, PWP_{W} decreases by 2(KW1)2(K_{W}-1). Therefore,

ΔVW,3{(S,i),(T,j)}\displaystyle{\Delta V}_{W,3}^{\{(S,i-),(T,j-)\}}
CW(2)(2(KW1))𝟙{CW(3)+2(KW1)PW}\displaystyle\leq C^{(2)}_{W}(2(K_{W}-1))\mathbbm{1}{\{C_{W}^{(3)}+2(K_{W}-1)\geq P_{W}\}}
2CW(2)KW𝟙{CW(3)+2KWPW}=2IW(2).\displaystyle\leq 2C^{(2)}_{W}K_{W}\mathbbm{1}\{C_{W}^{(3)}+2K_{W}\geq P_{W}\}=2I_{W}^{(2)}. (A.52)

Equations (A.48) to (A-C) establish the bounds in Table I.

Appendix B Bounding Rarest-First For Rare Pieces Using Random-Novel For Rare Pieces

Lemma 7

For all 𝐱\mathbf{x},

QVW(RW+)rRW,S:WS{r}xW(S)|𝐱|[LU|RWS|\displaystyle{QV}_{W}^{(R_{W}+)}\leq\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU}{|R_{W}\setminus S|}\right.
+Δpξ1V:W𝒲V,T:rTxV(T)|(TRW)S|]ΨW(+).\displaystyle\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\right]\Psi_{W}^{(+)}.
Proof:

Using (b)), (III-A3) and the fact that ΨW(r+)0\Psi_{W}^{(r+)}\leq 0 for every rRWr\in R_{W},

QVW(RW+)rRW,S:WS{r}xW(S)|𝐱|[LU𝟙{rR¯(,W,S)}|R¯(,W,S)|\displaystyle{QV}_{W}^{(R_{W}+)}\leq\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU\mathbbm{1}{\{r\in\underline{R}_{(\mathcal{F},W,S)}\}}}{|\underline{R}_{(\mathcal{F},W,S)}|}\right.
+Δpξ1V:W𝒲V,T:rTxV(T)𝟙{rR¯(T,W,S)}|R¯(T,W,S)|]ΨW(r+)\displaystyle\hskip 10.0pt\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{x_{V}^{(T)}\mathbbm{1}{\{r\in\underline{R}_{(T,W,S)}\}}}{|\underline{R}_{(T,W,S)}|}\right]\Psi_{W}^{(r+)}
=(s)rRW,S:WS{r}xW(S)|𝐱|[LU𝟙{rR¯(,W,S)}|R¯(,W,S)|\displaystyle\stackrel{{\scriptstyle\textnormal{(s)}}}{{\mathstrut{=}}}\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU\mathbbm{1}{\{r\in\underline{R}_{(\mathcal{F},W,S)}\}}}{|\underline{R}_{(\mathcal{F},W,S)}|}\right.
+Δpξ1V:W𝒲V,T:rTxV(T)𝟙{rR¯(T,W,S)}|R¯(T,W,S)|]ΨW(+).\displaystyle\hskip 10.0pt\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{x_{V}^{(T)}\mathbbm{1}{\{r\in\underline{R}_{(T,W,S)}\}}}{|\underline{R}_{(T,W,S)}|}\right]\Psi_{W}^{(+)}. (B.53)

Here, (B) uses the fact that ΨW(r+)\Psi_{W}^{(r+)} is the same for all rRWr\in R_{W}, which we have denoted by ΨW(+)\Psi_{W}^{(+)}. Then, we can upper bound the first term as follows.

First Term LU=rRW,S:WS{r}xW(S)|𝐱|𝟙{rR¯(,W,S)}|R¯(,W,S)|ΨW(+)\displaystyle\frac{\text{First Term }}{LU}=\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{\mathbbm{1}{\{r\in\underline{R}_{(\mathcal{F},W,S)}\}}}{|\underline{R}_{(\mathcal{F},W,S)}|}\Psi_{W}^{(+)}
=(t)S:|SW|<KW1,r:rRWSxW(S)|𝐱|𝟙{rR¯(,W,S)}|R¯(,W,S)|ΨW(+)\displaystyle\stackrel{{\scriptstyle\textnormal{(t)}}}{{\mathstrut{=}}}\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ r:r\in R_{W}\setminus S\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{\mathbbm{1}{\{r\in\underline{R}_{(\mathcal{F},W,S)}\}}}{|\underline{R}_{(\mathcal{F},W,S)}|}\Psi_{W}^{(+)}
=S:|SW|<KW1,r:rR¯(,W,S)xW(S)|𝐱|1|R¯(,W,S)|ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ r:r\in\underline{R}_{(\mathcal{F},W,S)}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{1}{|\underline{R}_{(\mathcal{F},W,S)}|}\Psi_{W}^{(+)}
=S:|SW|<KW1xW(S)|𝐱|ΨW(+)\displaystyle=\sum\limits_{S:|S\cap W|<K_{W}-1}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\Psi_{W}^{(+)}
=S:|SW|<KW1xW(S)|𝐱||RWS||RWS|ΨW(+)\displaystyle=\sum\limits_{S:|S\cap W|<K_{W}-1}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{|R_{W}\setminus S|}{|R_{W}\setminus S|}\Psi_{W}^{(+)}
=S:|SW|<KW1,r:rRWSxW(S)|𝐱|1|RWS|ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ r:r\in R_{W}\setminus S\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{1}{|R_{W}\setminus S|}\Psi_{W}^{(+)}
=(u)rRW,S:WS{r}xW(S)|𝐱|1|RWS|ΨW(+).\displaystyle\stackrel{{\scriptstyle\textnormal{(u)}}}{{\mathstrut{=}}}\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{1}{|R_{W}\setminus S|}\Psi_{W}^{(+)}. (B.54)

In steps (B) and (B.54), we change the order of summation. Similarly, we can upper bound the second term as follows.

Second Term Δpξ1=rRW,S:WS{r},V:W𝒲V,T:rTxW(S)|𝐱|xV(T)𝟙{rR¯(T,W,S)}|R¯(T,W,S)|ΨW(+)\displaystyle\frac{\text{Second Term }}{\Delta_{p}\xi_{1}}=\sum\limits_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\},\\ V:W\in\mathcal{W}_{V},T:r\in T\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{x_{V}^{(T)}\mathbbm{1}{\{r\in\underline{R}_{(T,W,S)}\}}}{|\underline{R}_{(T,W,S)}|}\Psi_{W}^{(+)}
=(v)S:|SW|<KW1,V:W𝒲V,T:(TRW)S,r:r(TRW)SxW(S)|𝐱|xV(T)𝟙{rR¯(T,W,S)}|R¯(T,W,S)|ΨW(+)\displaystyle\stackrel{{\scriptstyle\textnormal{(v)}}}{{\mathstrut{=}}}\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ V:W\in\mathcal{W}_{V},T:(T\cap R_{W})\setminus S\neq\emptyset,\\ r:r\in(T\cap R_{W})\setminus S\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{x_{V}^{(T)}\mathbbm{1}{\{r\in\underline{R}_{(T,W,S)}\}}}{|\underline{R}_{(T,W,S)}|}\Psi_{W}^{(+)}
=S:|SW|<KW1,V:W𝒲V,T:(TRW)S,r:rR¯(T,W,S)xW(S)|𝐱|xV(T)|R¯(T,W,S)|ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ V:W\in\mathcal{W}_{V},T:(T\cap R_{W})\setminus S\neq\emptyset,\\ r:r\in\underline{R}_{(T,W,S)}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{x_{V}^{(T)}}{|\underline{R}_{(T,W,S)}|}\Psi_{W}^{(+)}
=S:|SW|<KW1,V:W𝒲V,T:(TRW)SxW(S)|𝐱|xV(T)ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ V:W\in\mathcal{W}_{V},T:(T\cap R_{W})\setminus S\neq\emptyset\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}x_{V}^{(T)}\Psi_{W}^{(+)}
=S:|SW|<KW1,V:W𝒲V,T:(TRW)SxW(S)|𝐱||(TRW)S|xV(T)|(TRW)S|ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ V:W\in\mathcal{W}_{V},T:(T\cap R_{W})\setminus S\neq\emptyset\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{|(T\cap R_{W})\setminus S|x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\Psi_{W}^{(+)}
=S:|SW|<KW1,V:W𝒲V,T:(TRW)S,r:r(TRW)SxW(S)|𝐱|xV(T)|(TRW)S|ΨW(+)\displaystyle=\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ V:W\in\mathcal{W}_{V},T:(T\cap R_{W})\setminus S\neq\emptyset,\\ r:r\in(T\cap R_{W})\setminus S\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\Psi_{W}^{(+)}
=(w)rRW,S:WS{r},V:W𝒲V,T:rTxW(S)|𝐱|xV(T)|(TRW)S|ΨW(+).\displaystyle\stackrel{{\scriptstyle\textnormal{(w)}}}{{\mathstrut{=}}}\sum\limits_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\},\\ V:W\in\mathcal{W}_{V},T:r\in T\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\Psi_{W}^{(+)}. (B.55)

In steps (B) and (B.55), we change the order of summation.

Note that both (B.54) and (B.55) are upper-bounds for the RNwPMS (swapping out RF by RN). Substituting the two in (B.53), we get

QVW(RW+)rRW,S:WS{r}xW(S)|𝐱|[LU|RWS|\displaystyle{QV}_{W}^{(R_{W}+)}\leq\sum_{\begin{subarray}{c}r\in R_{W},\\ S:W\setminus S\supsetneq\{r\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[\frac{LU}{|R_{W}\setminus S|}\right.
+Δpξ1V:W𝒲V,T:rTxV(T)|(TRW)S|]ΨW(r+).\displaystyle\hskip 10.0pt\left.+\Delta_{p}\xi_{1}\sum\limits_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:r\in T\end{subarray}}\frac{x_{V}^{(T)}}{|(T\cap R_{W})\setminus S|}\right]\Psi_{W}^{(r+)}.

Appendix C Combining QVW(RW+){QV}_{W}^{(R_{W}+)} and QVW(RWc+){QV}_{W}^{(R^{c}_{W}+)}

Lemma 8

For all 𝐱\mathbf{x},

QVW(W+)\displaystyle QV_{W}^{(W+)} |𝐱|W|𝐱|iWΓ¯W(i)aW(i)KW(1πW(i)γW(i))\displaystyle\leq\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)
×[𝟙{𝐱W1}(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\times\left[\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}}\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)IW(1)].\displaystyle\left.+\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right].
Proof:

Let

g(i,𝐱)\displaystyle g(i,\mathbf{x}) =𝟙{𝐱W2}4KW2CW(1)IW(1)\displaystyle=\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}
+𝟙{𝐱W1,iRW}ψ¯W0.\displaystyle\hskip 10.0pt+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1},i\in R_{W}\}\underline{\psi}_{W}\leq 0.

Adding (III-B2) with the first term in (III-B2), and using the definitions of q¯W(S,n+)\underline{q}_{W}^{(S,n+)} (see (b))) and ΨW(i+)\Psi_{W}^{(i+)} (see (III-A3)), we get

iW,S:WS{i}xW(S)|𝐱|[LU(ζW(i)𝟙{iRWc,RWS=}|WS|\displaystyle\sum\limits_{\begin{subarray}{c}i\in W,\\ S:W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\left[LU\left(\frac{\zeta_{W}^{(i)}\mathbbm{1}{\{i\in R^{c}_{W},R_{W}\setminus S=\emptyset\}}}{|W\setminus S|}\right.\right.
+𝟙{iRW}|RWS|)+Δpξ1V:W𝒲VT:iTxV(T)\displaystyle\hskip 28.45274pt\left.\left.+\frac{\mathbbm{1}{\{i\in R_{W}\}}}{|R_{W}\setminus S|}\right)+\Delta_{p}\xi_{1}\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V}\\ T:i\in T\end{subarray}}x_{V}^{(T)}\right.
×(ζW(i)𝟙{iRWc,(TRW)S=}|(TW)S|\displaystyle\hskip 28.45274pt\left.\times\left(\frac{\zeta_{W}^{(i)}\mathbbm{1}{\{i\in R^{c}_{W},(T\cap R_{W})\setminus S=\emptyset\}}}{|(T\cap W)\setminus S|}\right.\right.
+𝟙{iRW}|(TRW)S|)]g(i,𝐱).\displaystyle\hskip 28.45274pt\left.\left.+\frac{\mathbbm{1}{\{i\in R_{W}\}}}{|(T\cap R_{W})\setminus S|}\right)\right]g(i,\mathbf{x}). (C.56)

Here,

First TermLU\displaystyle\frac{\text{First Term}}{LU}
=[iRWc,WS{i},RWS=ζW(i)|WS|+iRWWS{i}1|RWS|]xW(S)|𝐱|g(i,𝐱)\displaystyle=\left[\sum\limits_{\begin{subarray}{c}i\in R^{c}_{W},\\ W\setminus S\supsetneq\{i\},\\ R_{W}\setminus S=\emptyset\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}+\sum\limits_{\begin{subarray}{c}i\in R_{W}\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{1}{|R_{W}\setminus S|}\right]\frac{x_{W}^{(S)}}{|\mathbf{x}|}g(i,\mathbf{x})
=(x)[|SW|<KW1,RWS=,iWSζW(i)|WS|\displaystyle\stackrel{{\scriptstyle\textnormal{(x)}}}{{\mathstrut{=}}}\left[\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S=\emptyset,i\in W\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}\right.
+|SW|<KW1,RWS,iRWS1|RWS|]xW(S)|𝐱|g(i,𝐱)\displaystyle\hskip 20.0pt\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S\neq\emptyset,i\in R_{W}\setminus S\end{subarray}}\frac{1}{|R_{W}\setminus S|}\right]\frac{x_{W}^{(S)}}{|\mathbf{x}|}g(i,\mathbf{x})
(y)[|SW|<KW1,RWS=,iWSζW(i)|WS|\displaystyle\stackrel{{\scriptstyle\textnormal{(y)}}}{{\mathstrut{\leq}}}\left[\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S=\emptyset,i\in W\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}\right.
+|SW|<KW1,RWS,iRWcSζW(i)|WS|\displaystyle\hskip 20.0pt\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S\neq\emptyset,i\in R^{c}_{W}\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}\right.
+|SW|<KW1,RWS,iRWS1|WS|]xW(S)|𝐱|g(i,𝐱)\displaystyle\hskip 20.0pt\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S\neq\emptyset,i\in R_{W}\setminus S\end{subarray}}\frac{1}{|W\setminus S|}\right]\frac{x_{W}^{(S)}}{|\mathbf{x}|}g(i,\mathbf{x})
=[|SW|<KW1,iRWcSζW(i)|WS|\displaystyle=\left[\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ i\in R^{c}_{W}\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}\right.
+|SW|<KW1,RWS,iRWS1|WS|]xW(S)|𝐱|g(i,𝐱)\displaystyle\hskip 20.0pt\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ R_{W}\setminus S\neq\emptyset,i\in R_{W}\setminus S\end{subarray}}\frac{1}{|W\setminus S|}\right]\frac{x_{W}^{(S)}}{|\mathbf{x}|}g(i,\mathbf{x})
=(z)[iRWc,WS{i}ζW(i)|WS|+iRW,WS{i}1|WS|]xW(S)|𝐱|g(i,𝐱)\displaystyle\stackrel{{\scriptstyle\textnormal{(z)}}}{{\mathstrut{=}}}\left[\sum\limits_{\begin{subarray}{c}i\in R^{c}_{W},\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{\zeta_{W}^{(i)}}{|W\setminus S|}+\sum\limits_{\begin{subarray}{c}i\in R_{W},\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{1}{|W\setminus S|}\right]\frac{x_{W}^{(S)}}{|\mathbf{x}|}g(i,\mathbf{x})
(aa)iW,WS{i}xW(S)|𝐱|aW(i)KWh(i,𝐱).\displaystyle\stackrel{{\scriptstyle\textnormal{(aa)}}}{{\mathstrut{\leq}}}\sum\limits_{\begin{subarray}{c}i\in W,\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{a_{W}^{(i)}}{K_{W}}h(i,\mathbf{x}). (C.57)

Steps (C) and (C) change the order of summation; step (C) uses ζW(i)1\zeta_{W}^{(i)}\leq 1, |RWS||WS||R_{W}\setminus S|\leq|W\setminus S|, and g(n,𝐱)g(r,𝐱)g(n,\mathbf{x})\leq g(r,\mathbf{x}) for all nRWc,rRWn\in R^{c}_{W},r\in R_{W}; (C.57) uses |WS|KW|W\setminus S|\leq K_{W}. Similarly,

 Second Term Δpξ1\displaystyle\frac{\text{ Second Term }}{\Delta_{p}\xi_{1}}
=V:W𝒲V[iRWc,WS{i},iT,(TRW)S=ζW(i)|(TW)S|\displaystyle=\sum_{V:W\in\mathcal{W}_{V}}\left[\sum\limits_{\begin{subarray}{c}i\in R^{c}_{W},W\setminus S\supsetneq\{i\},\\ i\in T,(T\cap R_{W})\setminus S=\emptyset\end{subarray}}\frac{\zeta_{W}^{(i)}}{|(T\cap W)\setminus S|}\right.
+iRW,WS{i},iT1|(TRW)S|]xW(S)xV(T)|𝐱|g(i,𝐱)\displaystyle\left.+\sum\limits_{\begin{subarray}{c}i\in R_{W},W\setminus S\supsetneq\{i\},\\ i\in T\end{subarray}}\frac{1}{|(T\cap R_{W})\setminus S|}\right]\frac{x_{W}^{(S)}x_{V}^{(T)}}{|\mathbf{x}|}g(i,\mathbf{x})
=(ab)V:W𝒲V[S:|SW|<KW1,(TRW)S=,i(TW)SζW(i)|(TW)S|\displaystyle\stackrel{{\scriptstyle\textnormal{(ab)}}}{{\mathstrut{=}}}\sum_{V:W\in\mathcal{W}_{V}}\left[\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ (T\cap R_{W})\setminus S=\emptyset,i\in(T\cap W)\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|(T\cap W)\setminus S|}\right.
+|SW|<KW1,(TRW)S,i(TRW)S1|(TRW)S|]xW(S)xV(T)|𝐱|g(i,𝐱)\displaystyle\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ (T\cap R_{W})\setminus S\neq\emptyset,\\ i\in(T\cap R_{W})\setminus S\end{subarray}}\frac{1}{|(T\cap R_{W})\setminus S|}\right]\frac{x_{W}^{(S)}x_{V}^{(T)}}{|\mathbf{x}|}g(i,\mathbf{x})
(ac)V:W𝒲V[S:|SW|<KW1,(TRW)S=,i(TW)SζW(i)|(TW)S|\displaystyle\stackrel{{\scriptstyle\textnormal{(ac)}}}{{\mathstrut{\leq}}}\sum_{V:W\in\mathcal{W}_{V}}\left[\sum\limits_{\begin{subarray}{c}S:|S\cap W|<K_{W}-1,\\ (T\cap R_{W})\setminus S=\emptyset,i\in(T\cap W)\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|(T\cap W)\setminus S|}\right.
+|SW|<KW1,(TRW)S,i(TRWc)SζW(i)|(TW)S|\displaystyle\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ (T\cap R_{W})\setminus S\neq\emptyset,i\in(T\cap R^{c}_{W})\setminus S\end{subarray}}\frac{\zeta_{W}^{(i)}}{|(T\cap W)\setminus S|}\right.
+|SW|<KW1,(TRW)S,i(TRW)S1|TS|]xW(S)xV(T)|𝐱|g(i,𝐱)\displaystyle\left.+\sum\limits_{\begin{subarray}{c}|S\cap W|<K_{W}-1,\\ (T\cap R_{W})\setminus S\neq\emptyset,i\in(T\cap R_{W})\setminus S\end{subarray}}\frac{1}{|T\setminus S|}\right]\frac{x_{W}^{(S)}x_{V}^{(T)}}{|\mathbf{x}|}g(i,\mathbf{x})
=(ad)V:W𝒲V[iRWc,WS{i}T:iTζW(i)|(TW)S|\displaystyle\stackrel{{\scriptstyle\textnormal{(ad)}}}{{\mathstrut{=}}}\sum_{V:W\in\mathcal{W}_{V}}\left[\sum\limits_{\begin{subarray}{c}i\in R^{c}_{W},W\setminus S\supsetneq\{i\}\\ T:i\in T\end{subarray}}\frac{\zeta_{W}^{(i)}}{|(T\cap W)\setminus S|}\right.
+iRW,WS{i},T:iT1|(TW)S|]xW(S)xV(T)|𝐱|g(i,𝐱)\displaystyle\left.+\sum\limits_{\begin{subarray}{c}i\in R_{W},W\setminus S\supsetneq\{i\},\\ T:i\in T\end{subarray}}\frac{1}{|(T\cap W)\setminus S|}\right]\frac{x_{W}^{(S)}x_{V}^{(T)}}{|\mathbf{x}|}g(i,\mathbf{x})
(ae)iW,WS{i}xW(S)|𝐱|aW(i)KWV:W𝒲V,T:iTxV(T)g(i,𝐱).\displaystyle\stackrel{{\scriptstyle\textnormal{(ae)}}}{{\mathstrut{\leq}}}\sum\limits_{\begin{subarray}{c}i\in W,\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{a_{W}^{(i)}}{K_{W}}\sum_{\begin{subarray}{c}V:W\in\mathcal{W}_{V},\\ T:i\in T\end{subarray}}x_{V}^{(T)}g(i,\mathbf{x}). (C.58)

Steps (C) and (C) change the order of summation; step (C) uses ζW(i)1\zeta_{W}^{(i)}\leq 1, |(TRW)S||(TW)S||(T\cap R_{W})\setminus S|\leq|(T\cap W)\setminus S|, and g(n,𝐱)g(r,𝐱)g(n,\mathbf{x})\leq g(r,\mathbf{x}) for all nRWc,rRWn\in R^{c}_{W},r\in R_{W}; step (C.58) uses |(TW)S|KW|(T\cap W)\setminus S|\leq K_{W}. Adding (C.57) and (C.58) gives the below upper-bound on (C),

iW,WS{i}xW(S)|𝐱|Γ¯W(i)aW(i)KW[𝟙{𝐱W2}4KW2CW(1)IW(1)\displaystyle\sum\limits_{\begin{subarray}{c}i\in W,\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right.
+𝟙{𝐱W1,iRW}ψ¯W].\displaystyle\left.+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1},i\in R_{W}\}\underline{\psi}_{W}\right]. (C.59)

Adding (C) with the second term in (III-B2), we get

QVW(W+)iW,WS{i}xW(S)|𝐱|Γ¯W(i)aW(i)KW[𝟙{𝐱W1}\displaystyle{QV}_{W}^{(W+)}\leq\sum\limits_{\begin{subarray}{c}i\in W,\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\right.
×(𝟙{iRWc}KWξ2ψ¯W+ψ¯W𝟙{iRW})\displaystyle\hskip 10.0pt\left.\times\left(\mathbbm{1}\{i\in R^{c}_{W}\}K_{W}\xi_{2}\overline{\psi}_{W}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)IW(1)]\displaystyle\hskip 20.0pt\left.+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right]
=|𝐱|W|𝐱|iW,WS{i}xW(S)|𝐱|WΓ¯W(i)aW(i)KW[𝟙{𝐱W1}\displaystyle=\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\sum\limits_{\begin{subarray}{c}i\in W,\\ W\setminus S\supsetneq\{i\}\end{subarray}}\frac{x_{W}^{(S)}}{|\mathbf{x}|_{W}}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}\right.
×(𝟙{iRWc}KWξ2ψ¯W+ψ¯W𝟙{iRW})\displaystyle\hskip 10.0pt\left.\times\left(\mathbbm{1}\{i\in R^{c}_{W}\}K_{W}\xi_{2}\overline{\psi}_{W}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)IW(1)]\displaystyle\hskip 20.0pt\left.+\mathbbm{1}\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right]
=|𝐱|W|𝐱|iWΓ¯W(i)aW(i)KW(1πW(i)γW(i))[𝟙{𝐱W1}\displaystyle=\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)\left[\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{1}\}}\right.
×(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW})\displaystyle\hskip 10.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}{\{i\in R^{c}_{W}\}}+\underline{\psi}_{W}\mathbbm{1}{\{i\in R_{W}\}}\right)\right.
+𝟙{𝐱W2}4KW2CW(1)IW(1)],\displaystyle\hskip 20.0pt\left.+\mathbbm{1}{\{\mathbf{x}\in\mathcal{R}_{W}^{2}\}}4K_{W}^{2}-C^{(1)}_{W}-I_{W}^{(1)}\right],

where we recall that γW(i)\gamma_{W}^{(i)} is the fraction of swarm-WW peers who have all the pieces of WW except ii. ∎

Appendix D Exponential Decay of Positive Drift from Non-Rare Pieces in W1\mathcal{R}_{W}^{1}

Lemma 9

For all 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1},

nRWcΓ¯W(n)ζW(n)KW[(1π¯W)KWξ2ψ¯W]DW.\displaystyle\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)K_{W}\xi_{2}\overline{\psi}_{W}\right]\leq D_{W}.

where

DW\displaystyle D_{W} =DW(η,ξ2,L,U,Δp,KW)\displaystyle=D_{W}(\eta,\xi_{2},L,U,\Delta_{p},K_{W})
DW(1)+DW(2)𝟙{𝒲W{W}},\displaystyle\coloneqq D_{W}^{(1)}+D_{W}^{(2)}\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\},
DW(1)\displaystyle D_{W}^{(1)} =12e2η2ξ2(LU+Δp)βW2KW7,\displaystyle=12e^{-2}\eta^{-2}\xi_{2}(LU+\Delta_{p})\beta_{W}^{2}K_{W}^{7},
DW(2)\displaystyle D_{W}^{(2)} =3e2η1ξ2(LU+Δp)βW1+αW1KW5+αW1.\displaystyle=3e^{-2}\eta^{-1}\xi_{2}(LU+\Delta_{p})\beta_{W}^{1+\alpha_{W}^{-1}}K_{W}^{5+\alpha_{W}^{-1}}.
Proof:
nRWcΓ¯W(n)ζW(n)KW[(1π¯W)KWξ2ψ¯W]\displaystyle\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)K_{W}\xi_{2}\overline{\psi}_{W}\right]
(af)nRWc(LU+2Δp(c¯W+dW(n)))ξ2(3KW2c¯W)ζW(n)\displaystyle\hskip 10.0pt\stackrel{{\scriptstyle\textnormal{(af)}}}{{\mathstrut{\leq}}}\sum_{n\in R^{c}_{W}}\left(LU+2\Delta_{p}\left(\overline{c}_{W}+d^{(n)}_{W}\right)\right)\xi_{2}\left(3K_{W}^{2}\overline{c}_{W}\right)\zeta_{W}^{(n)}
(ag)3KW2ξ2(LU+2Δp)nRWc(c¯W+dW(n))c¯WζW(n).\displaystyle\hskip 10.0pt\stackrel{{\scriptstyle\textnormal{(ag)}}}{{\mathstrut{\leq}}}3K_{W}^{2}\xi_{2}\left(LU+2\Delta_{p}\right)\sum_{n\in R^{c}_{W}}\left(\overline{c}_{W}+d^{(n)}_{W}\right)\overline{c}_{W}\zeta_{W}^{(n)}. (D.60)

Here, (D) uses ψ¯W3KW2c¯W\overline{\psi}_{W}\leq 3K_{W}^{2}\overline{c}_{W} in W1\mathcal{R}_{W}^{1}; (D.60) uses 1c¯W+dW(n)1\leq\overline{c}_{W}+d^{(n)}_{W}. Now, in W1\mathcal{R}_{W}^{1}, MWηc¯WM_{W}\geq\eta\overline{c}_{W}. This implies that

m¯W=c¯Wc¯Wηc¯WKW.\displaystyle\overline{m}_{W}=\overline{c}_{W}-\underline{c}_{W}\geq\frac{\eta\overline{c}_{W}}{K_{W}}.

Therefore,

ζW(n)exp(ηc¯WKW1+(dW(n))αWβWKW).\displaystyle\zeta_{W}^{(n)}\leq\exp\left(-\frac{\eta\overline{c}_{W}K_{W}^{-1}+\left(d^{(n)}_{W}\right)^{\alpha_{W}}}{\beta_{W}K_{W}}\right).

If βW=0\beta_{W}=0, then ζW(n)=0\zeta_{W}^{(n)}=0 (non-rare pieces are completely suppressed) and the Lemma follows trivially. If βW>0\beta_{W}>0, then

nRWcc¯W2ζW(n)\displaystyle\sum_{n\in R^{c}_{W}}\overline{c}_{W}^{2}\zeta_{W}^{(n)} KWmaxy0y2exp(ηβWKW2y2)\displaystyle\leq K_{W}\max\limits_{y\geq 0}y^{2}\exp\left(-\frac{\eta}{\beta_{W}K_{W}^{2}}y^{2}\right)
=KW(2βWKW2η)2e2\displaystyle=K_{W}\left(2\frac{\beta_{W}K_{W}^{2}}{\eta}\right)^{2}e^{-2}
=4e2η2βW2KW5,\displaystyle=4e^{-2}\eta^{-2}\beta_{W}^{2}K_{W}^{5}, (D.61)

and

nRWcc¯WdW(n)ζW(n)=nRWcc¯WdW(n)ζW(n)𝟙{𝒲W{W}}\displaystyle\sum_{n\in R^{c}_{W}}\overline{c}_{W}d^{(n)}_{W}\zeta_{W}^{(n)}=\sum_{n\in R^{c}_{W}}\overline{c}_{W}d^{(n)}_{W}\zeta_{W}^{(n)}\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\}
KWmaxy0yexp(ηβWKW2y)\displaystyle\leq K_{W}\max\limits_{y\geq 0}y\exp\left(-\frac{\eta}{\beta_{W}K_{W}^{2}}y\right)
×maxz0zexp(zαWβWKW)𝟙{𝒲W{W}}\displaystyle\hskip 30.0pt\times\max\limits_{z\geq 0}z\exp\left(-\frac{z^{\alpha_{W}}}{\beta_{W}K_{W}}\right)\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\}
=KW(βWKW2η)e1\displaystyle=K_{W}\left(\frac{\beta_{W}K_{W}^{2}}{\eta}\right)e^{-1}
×(βWKW)1αWe1𝟙{𝒲W{W}}\displaystyle\hskip 30.0pt\times\left(\beta_{W}K_{W}\right)^{\frac{1}{\alpha_{W}}}e^{-1}\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\}
=e2η1βW1+αW1KW3+αW1𝟙{𝒲W{W}}.\displaystyle=e^{-2}\eta^{-1}\beta_{W}^{1+\alpha_{W}^{-1}}K_{W}^{3+\alpha_{W}^{-1}}\mathbbm{1}\{\mathcal{W}_{W}\setminus\{W\}\neq\emptyset\}. (D.62)

Using (D.61) and (D.62) in (D.60), the Lemma follows. ∎

Appendix E Proof of Theorem 1

For each W𝒲W\in\mathcal{W}, let δW(0,1)\delta_{W}\in(0,1) be sufficiently small number to be chosen appropriately, and recall that the two blocks W1={𝐱𝒮:MW2(1η)ηc¯W}\mathcal{R}_{W}^{1}=\{\mathbf{x}\in\mathcal{S}:M_{W}-2(1-\eta)\geq\eta\overline{c}_{W}\} and W2=𝒮W1\mathcal{R}_{W}^{2}=\mathcal{S}\setminus\mathcal{R}_{W}^{1} form a partition of the state-space 𝒮\mathcal{S}. For each k[2]k\in[2], we further divide the block Wk\mathcal{R}_{W}^{k} into three regions, namely

Wk1\displaystyle\mathcal{R}_{W}^{k1} =Wk{(KWη)c¯Wir¯cW(i)δW|𝐱|W},\displaystyle=\mathcal{R}_{W}^{k}\cap\left\{(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq\delta_{W}|\mathbf{x}|_{W}\right\},
Wk2\displaystyle\mathcal{R}_{W}^{k2} =Wk{δW|𝐱|W>(KWη)c¯Wir¯cW(i)\displaystyle=\mathcal{R}_{W}^{k}\cap\left\{\delta_{W}|\mathbf{x}|_{W}>(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq\dots\right.
(CW(3)2)(1η)KW},\displaystyle\hskip 30.0pt\left.\geq\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}\right\},
Wk3\displaystyle\mathcal{R}_{W}^{k3} =Wk{(KWη)c¯Wir¯cW(i)<δW|𝐱|W and \displaystyle=\mathcal{R}_{W}^{k}\cap\left\{(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}<\delta_{W}|\mathbf{x}|_{W}\text{ and }\right.
(KWη)c¯Wir¯cW(i)<(CW(3)2)(1η)KW}.\displaystyle\hskip 30.0pt\left.(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}<\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}\right\}.

Below we prove 1 through a series of lemmas, together which establish that the unit-transition drift conditions are satisfied by the candidate Lyapunov function given by (26) and (27).

Lemma 10

For all W𝒲W\in\mathcal{W}, k[2]k\in[2], and 𝐱Wk1\mathbf{x}\in\mathcal{R}_{W}^{k1}, the highest frequency π¯W\overline{\pi}_{W} is lower-bounded by δWKWη\frac{\delta_{W}}{K_{W}-\eta}. Therefore, the total chunk-count PWP_{W} is lower-bounded by δWKWη|𝐱|W\frac{\delta_{W}}{K_{W}-\eta}|\mathbf{x}|_{W}.

Proof:

We can lower-bound PWP_{W} by c¯W\overline{c}_{W}. Given (KWη)c¯Wir¯cW(i)δW|𝐱|W(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq\delta_{W}|\mathbf{x}|_{W} in Wk1\mathcal{R}_{W}^{k1}, the Lemma is obvious. ∎

Lemma 11

For all W𝒲W\in\mathcal{W}, k[2]k\in[2], and 𝐱Wk2Wk3\mathbf{x}\in\mathcal{R}_{W}^{k2}\cup\mathcal{R}_{W}^{k3}, the fraction of peers missing piece iWi\in W, i.e., 1πW(i)1-\pi^{(i)}_{W} is lower-bounded by 0.50.5 provided δW0.5(1η)\delta_{W}\leq 0.5(1-\eta).

Proof:

In Wk2Wk3\mathcal{R}_{W}^{k2}\cup\mathcal{R}_{W}^{k3}, we have (KWη)c¯Wir¯cW(i)<δW|𝐱|W(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}<\delta_{W}|\mathbf{x}|_{W}. Since cW(i)c^{(i)}_{W} is at most c¯W\overline{c}_{W}, this implies that (1η)c¯W<δW|𝐱|Wπ¯W<δW1η(1-\eta)\overline{c}_{W}<\delta_{W}|\mathbf{x}|_{W}\implies\overline{\pi}_{W}<\frac{\delta_{W}}{1-\eta}. Now, for any piece iWi\in W, we have 1πW(i)1π¯W>1δW1η1-\pi^{(i)}_{W}\geq 1-\overline{\pi}_{W}>1-\frac{\delta_{W}}{1-\eta}. By choosing δW0.5(1η)\delta_{W}\leq 0.5(1-\eta), we ensure that 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5. ∎

Lemma 12

For all W𝒲W\in\mathcal{W}, k[2]k\in[2], and 𝐱Wk2Wk3\mathbf{x}\in\mathcal{R}_{W}^{k2}\cup\mathcal{R}_{W}^{k3}, the fraction of peers who are missing only piece iWi\in W, i.e., γW(i)=S:WS={i}xW(S)|𝐱|W\gamma^{(i)}_{W}=\sum_{S:W\setminus S=\{i\}}\frac{x_{W}^{(S)}}{|\mathbf{x}|_{W}} is upper bounded by δW1η\frac{\delta_{W}}{1-\eta}.

Proof:

A swarm-WW peer missing only piece ii of file-WW has all the other pieces of the file, therefore,

S:WS={i}xW(S)\displaystyle\sum_{S:W\setminus S=\{i\}}x_{W}^{(S)} =γW(i)|𝐱|W\displaystyle=\gamma^{(i)}_{W}|\mathbf{x}|_{W}
πW(i)^|𝐱|W for all i^W such that i^i\displaystyle\leq\pi_{W}^{\hat{(i)}}|\mathbf{x}|_{W}\text{ for all }\hat{i}\in W\text{ such that }\hat{i}\neq i
π¯W|𝐱|W.\displaystyle\leq\overline{\pi}_{W}|\mathbf{x}|_{W}.

Given π¯W<δW1η\overline{\pi}_{W}<\frac{\delta_{W}}{1-\eta} in Wk2Wk3\mathcal{R}_{W}^{k2}\cup\mathcal{R}_{W}^{k3}, the inequality follows. ∎

Lemma 13

For all W𝒲W\in\mathcal{W}, θ1>0\theta_{1}>0, and θ22(1η)2\theta_{2}\geq 2(1-\eta)^{2}, let gg be defined as

g(θ1,θ2)\displaystyle g(\theta_{1},\theta_{2}) =rRWΓ¯W(r)θ1[(1πW(r))(ψ¯Wθ2)]\displaystyle=\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{\theta_{1}}\left[\left(1-\pi^{(r)}_{W}\right)\left(\underline{\psi}_{W}-\theta_{2}\right)\right]

Then for all 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1}, gg is upper-bounded by

2(1η)θ1KW[2(1η)(LU2(1η)Δp)\displaystyle-\frac{2(1-\eta)}{\theta_{1}K_{W}}\left[2(1-\eta)\left(LU-2(1-\eta)\Delta_{p}\right)\right.
+((KWη)c¯Wir¯cW(i))(LU2(1η)Δp)].\displaystyle\hskip 10.0pt\left.+\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\right)(LU\wedge 2(1-\eta)\Delta_{p})\right].

Consequently, for any θ\theta and ϵ>0\epsilon>0, there exists NW(1)=NW(1)(θ,θ1,θ2,ϵ)+N^{(1)}_{W}=N^{(1)}_{W}(\theta,\theta_{1},\theta_{2},\epsilon)\in\mathbb{R}^{+} such that for all 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1},

θ+g(θ1,θ2)ϵ\displaystyle\theta+g(\theta_{1},\theta_{2})\leq-\epsilon

if (KWη)c¯Wir¯cW(i)NW(1)(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq N^{(1)}_{W}.

Proof:

Since 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1}, ψ¯W0\underline{\psi}_{W}\leq 0. Given θ2>0\theta_{2}>0, each term in the summation is negative. Let us denote the rarest-piece by r¯\underline{r}, i.e., cW(r¯)=c¯Wc^{(\underline{r})}_{W}=\underline{c}_{W}. By Lemma 2, 1πW(r¯)1-\pi^{(\underline{r})}_{W} is bounded from below by 1KW\frac{1}{K_{W}}. Upper-bounding the summation in gg by considering only the rarest-piece r¯\underline{r}, we get

g(θ1,θ2)\displaystyle g(\theta_{1},\theta_{2})
Γ¯W(r¯)θ1KW[2(1η)22(1η)(MWηc¯W)θ2]\displaystyle\leq\frac{\underline{\Gamma}_{W}^{(\underline{r})}}{\theta_{1}K_{W}}\left[2(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)-\theta_{2}\right]
=(ah)2(1η)Γ¯W(r¯)θ1KW[((KWη)c¯Wir¯cW(i)c¯W)]\displaystyle\stackrel{{\scriptstyle\textnormal{(ah)}}}{{\mathstrut{=}}}-\frac{2(1-\eta)\underline{\Gamma}_{W}^{(\underline{r})}}{\theta_{1}K_{W}}\left[\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}-\underline{c}_{W}\right)\right]
(ai)2(1η)θ1KW(LU+Δpc¯W)\displaystyle\stackrel{{\scriptstyle\textnormal{(ai)}}}{{\mathstrut{\leq}}}-\frac{2(1-\eta)}{\theta_{1}K_{W}}\left(LU+\Delta_{p}\underline{c}_{W}\right)
((KWη)c¯Wir¯cW(i)c¯W)\displaystyle\hskip 30.0pt\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}-\underline{c}_{W}\right)
g~(c¯W;θ1),\displaystyle\coloneqq\widetilde{g}(\underline{c}_{W};\theta_{1}),

where, (E) uses θ22(1η)2\theta_{2}\geq 2(1-\eta)^{2} and the definition of MWM_{W} (see (10)); and (E) uses Γ¯W(r¯)LU+Δpc¯W\underline{\Gamma}_{W}^{(\underline{r})}\geq LU+\Delta_{p}\underline{c}_{W} (see (18)).

Since 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1}, we have MW2(1η)ηc¯WM_{W}-2(1-\eta)\geq\eta\overline{c}_{W}, which implies that c¯W(KWη)c¯Wir¯cW(i)2(1η)\underline{c}_{W}\leq(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}-2(1-\eta). It can be verified that g~(c¯W;θ1)\widetilde{g}(\underline{c}_{W};\theta_{1}) is a quadratic and strictly convex function of c¯W\underline{c}_{W}. Therefore, it has a unique minimum and attains its maximum at the boundary points 0 and (KWη)c¯Wir¯cW(i)2(1η)(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}-2(1-\eta). This gives

g(θ1,θ2)g~(0)g~((KWη)c¯Wir¯cW(i)2(1η))\displaystyle g(\theta_{1},\theta_{2})\leq\widetilde{g}(0)\wedge\widetilde{g}\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}-2(1-\eta)\right)
=2(1η)θ1KW[2(1η)(LU2(1η)Δp)\displaystyle=-\frac{2(1-\eta)}{\theta_{1}K_{W}}\left[2(1-\eta)\left(LU-2(1-\eta)\Delta_{p}\right)\right.
+((KWη)c¯Wir¯cW(i))(LU2(1η)Δp)].\displaystyle\hskip 10.0pt\left.+\left((K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\right)(LU\wedge 2(1-\eta)\Delta_{p})\right].

Lemma 14

For any ϵ>0\epsilon>0 and any W𝒲W\in\mathcal{W}, there exists a countable set 𝒜W\mathcal{A}_{W} and a finite constant BW0B_{W}\geq 0 such that

QV~W\displaystyle\widetilde{QV}_{W} ϵ𝟙{𝐱𝒜Wc}+BW𝟙{𝐱𝒜W}, and\displaystyle\leq-\epsilon\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}^{c}_{W}\}}+B_{W}\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}_{W}\}},\text{ and }
NW\displaystyle N_{W} =max𝐱𝒜W|𝐱|W<.\displaystyle=\max\limits_{\mathbf{x}\in\mathcal{A}_{W}}|\mathbf{x}|_{W}<\infty.
Proof:

We will show that QV~W\widetilde{{QV}}_{W} is upper bounded by ϵ-\epsilon over the region Wk\mathcal{R}_{W}^{k} for each k[2]k\in[2], except possibly, for a finite and bounded population of swarm-WW.

Case 1 - 𝐱W1\mathbf{x}\in\mathcal{R}_{W}^{1}: From (III-B4) and (III-B4), we have

QV~W=|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))ΨW(i)\displaystyle\widetilde{QV}_{W}=|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\Psi_{W}^{(i)}\right.
(1πW(i)γW(i))IW(1)+γW(i)KWξ2IW(2)],\displaystyle\left.-\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)I_{W}^{(1)}+\gamma_{W}^{(i)}K_{W}\xi_{2}I_{W}^{(2)}\right],

where

ΨW(i)(𝐱)\displaystyle\Psi_{W}^{(i)}(\mathbf{x}) =KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1).\displaystyle=K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}.

Region W11\mathcal{R}_{W}^{11}: Here, PWc¯WδWKWη|𝐱|WP_{W}\geq\overline{c}_{W}\geq\frac{\delta_{W}}{K_{W}-\eta}|\mathbf{x}|_{W} (see Lemma 10). Therefore, for all large |𝐱|W|\mathbf{x}|_{W}, IW(1),IW(2)I_{W}^{(1)},I_{W}^{(2)} are both zero. This gives

QVW~|𝝀|C(1)+iWΓ¯W(r)aW(i)KW[(1πW(i))\displaystyle\widetilde{QV_{W}}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(r)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1))]\displaystyle\hskip 10.0pt\left.\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}\right)\right]
|𝝀|C(1)+nRWcΓ¯W(n)ζW(n)KW[(1π¯W)KWξ2ψ¯W]\displaystyle\leq|\bm{\lambda}|C^{(1)}+\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)K_{W}\xi_{2}\overline{\psi}_{W}\right]
+rRWΓ¯W(r)KW[(1πW(r))(ψ¯WCW(1))]\displaystyle\hskip 10.0pt+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\left(\underline{\psi}_{W}-C^{(1)}_{W}\right)\right]
|𝝀|C(1)+DW+rRWΓ¯W(r)KW[(1πW(r))ψ¯W],\displaystyle\leq|\bm{\lambda}|C^{(1)}+D_{W}+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\underline{\psi}_{W}\right],

where DW=DW(η,ξ2,L,U,Δp,βW,KW)D_{W}=D_{W}(\eta,\xi_{2},L,U,\Delta_{p},\beta_{W},K_{W}) is given by Lemma 9. From Lemma 13, it follows that QV~Wϵ\widetilde{QV}_{W}\leq-\epsilon if (KWη)c¯Wir¯cW(i)NW(1)(θ=|𝝀|C(1)+DW,θ1=KW,θ2=CW(1),ϵ)(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq N^{(1)}_{W}(\theta=|\bm{\lambda}|C^{(1)}+D_{W},\theta_{1}=K_{W},\theta_{2}=C^{(1)}_{W},\epsilon). Since (KWη)c¯Wir¯cW(i)δW|𝐱|W(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq\delta_{W}|\mathbf{x}|_{W}, this is true for all large |𝐱|W|\mathbf{x}|_{W}.

Region W12\mathcal{R}_{W}^{12}: Here, we use the bounds, IW(1)0-I_{W}^{(1)}\leq 0, IW(2)KWCW(2)I_{W}^{(2)}\leq K_{W}C^{(2)}_{W}, and γW(i)<δW1η\gamma_{W}^{(i)}<\frac{\delta_{W}}{1-\eta} for every iWi\in W (Lemma 12). Then, for all large |𝐱|W|\mathbf{x}|_{W},

QV~W|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\widetilde{QV}_{W}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
×(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1))\displaystyle\hskip 10.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}\right)\right.
+δW1ηKW2ξ2CW(2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right]
(aj)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\stackrel{{\scriptstyle\textnormal{(aj)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}CW(1)\displaystyle\hskip 10.0pt\left.\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}\right.\right.
+2δW1ηKW2ξ2CW(2))]\displaystyle\hskip 30.0pt\left.\left.+\frac{2\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right)\right]
(ak)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\stackrel{{\scriptstyle\textnormal{(ak)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
×(KWξ2ψ¯W𝟙{iRWc}+ψ¯W𝟙{iRW}\displaystyle\hskip 10.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}+\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}\right.\right.
0.5CW(1))]\displaystyle\hskip 10.0pt\left.\left.-0.5C^{(1)}_{W}\right)\right]
|𝝀|C(1)+nRWcΓ¯W(n)ζW(n)KW[(1π¯W)KWξ2ψ¯W]\displaystyle\leq|\bm{\lambda}|C^{(1)}+\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)K_{W}\xi_{2}\overline{\psi}_{W}\right]
+rRWcΓ¯W(r)KW[(1πW(r))(ψ¯W0.5CW(1))]\displaystyle\hskip 10.0pt+\sum_{r\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\left(\underline{\psi}_{W}-0.5C^{(1)}_{W}\right)\right]
(al)|𝝀|C(1)+DW+rRWΓ¯W(r)KW[(1πW(r))ψ¯W].\displaystyle\stackrel{{\scriptstyle\textnormal{(al)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+D_{W}+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[\left(1-\pi^{(r)}_{W}\right)\underline{\psi}_{W}\right].

Here, (E) uses 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5 for every iWi\in W (Lemma 11); (E) follows from choosing δW\delta_{W} small enough so that 2δW1ηKW2ξ2CW(2)0.5CW(1)2\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\leq 0.5C^{(1)}_{W}; (E) follows from Lemma 9. From Lemma 13, it follows that QV~Wϵ\widetilde{QV}_{W}\leq-\epsilon if (KWη)c¯Wir¯cW(i)NW(1)(θ=|𝝀|C(1)+DW,θ1=KW,θ2=0.5CW(1),ϵ)(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq N^{(1)}_{W}(\theta=|\bm{\lambda}|C^{(1)}+D_{W},\allowbreak\theta_{1}=K_{W},\theta_{2}=0.5C^{(1)}_{W},\epsilon). Since (KWη)c¯Wir¯cW(i)(CW(3)2)(1η)KW(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}\geq\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}, choosing CW(3)C_{W}^{(3)} large enough so that (CW(3)2)(1η)KWNW(12)\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}\geq N^{(12)}_{W} ensures that QV~Wϵ\widetilde{QV}_{W}\leq-\epsilon for large enough |𝐱|W|\mathbf{x}|_{W}.

Region W13\mathcal{R}_{W}^{13}: Here, (KWη)c¯Wir¯cW(i)<(CW(3)2)(1η)KW(K_{W}-\eta)\overline{c}_{W}-\sum_{i\neq\underline{r}}c^{(i)}_{W}<\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}. This implies that c¯W<CW(3)2KW\overline{c}_{W}<\frac{C_{W}^{(3)}-2}{K_{W}}. Therefore, the total chunk-count PWP_{W} is upper-bounded by KWc¯WCW(3)2K_{W}\overline{c}_{W}\leq C_{W}^{(3)}-2. Consequently, IW(1)I_{W}^{(1)} and IW(2)I_{W}^{(2)} are both non-zero. We use the bounds ψ¯W𝟙{iRW}CW(1)0\underline{\psi}_{W}\mathbbm{1}\{i\in R_{W}\}-C^{(1)}_{W}\leq 0 and γW(i)<δW1η\gamma_{W}^{(i)}<\frac{\delta_{W}}{1-\eta} for every iWi\in W (Lemma 12). Then, for all large |𝐱|W|\mathbf{x}|_{W},

QV~W|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\widetilde{QV}_{W}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
×(KWξ2ψ¯W𝟙{iRWc})(1πW(i)δW1η)CW(2)\displaystyle\hskip 5.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}\right)-\left(1-\pi^{(i)}_{W}-\frac{\delta_{W}}{1-\eta}\right)C^{(2)}_{W}\right.
+δW1ηKW2ξ2CW(2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right]
(am)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\stackrel{{\scriptstyle\textnormal{(am)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
(KWξ2ψ¯W𝟙{iRWc})0.5CW(2)\displaystyle\hskip 10.0pt\left.\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}\right)-0.5C^{(2)}_{W}\right.
+δW1ηCW(2)(1+KW2ξ2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}C^{(2)}_{W}\left(1+K_{W}^{2}\xi_{2}\right)\right]
(an)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))\displaystyle\stackrel{{\scriptstyle\textnormal{(an)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\right.
×(KWξ2ψ¯W𝟙{iRWc})0.25CW(2)]\displaystyle\hskip 10.0pt\left.\times\left(K_{W}\xi_{2}\overline{\psi}_{W}\mathbbm{1}\{i\in R^{c}_{W}\}\right)-0.25C^{(2)}_{W}\right]
|𝝀|C(1)+nRWcΓ¯W(n)ζW(n)KW[(1π¯W)(KWξ2ψ¯W)]\displaystyle\leq|\bm{\lambda}|C^{(1)}+\sum_{n\in R^{c}_{W}}\frac{\underline{\Gamma}_{W}^{(n)}\zeta_{W}^{(n)}}{K_{W}}\left[\left(1-\overline{\pi}_{W}\right)\left(K_{W}\xi_{2}\overline{\psi}_{W}\right)\right]
+rRWΓ¯W(r)KW[0.25CW(2)]\displaystyle\hskip 10.0pt+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[-0.25C^{(2)}_{W}\right]
(ao)|𝝀|C(1)+DW+rRWΓ¯W(r)KW[0.25CW(2)]\displaystyle\stackrel{{\scriptstyle\textnormal{(ao)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+D_{W}+\sum_{r\in R_{W}}\frac{\underline{\Gamma}_{W}^{(r)}}{K_{W}}\left[-0.25C^{(2)}_{W}\right]
(ap)|𝝀|C(1)+DW0.25KW1LUCW(2)\displaystyle\stackrel{{\scriptstyle\textnormal{(ap)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+D_{W}-0.25K_{W}^{-1}LUC^{(2)}_{W}
(aq)ϵ.\displaystyle\stackrel{{\scriptstyle\textnormal{(aq)}}}{{\mathstrut{\leq}}}-\epsilon.

Here, (E) uses 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5 for iWi\in W (Lemma 11); (E) follows from choosing δW\delta_{W} small enough so that δW1ηCW(2)(1+KW2ξ2)0.25CW(2)\frac{\delta_{W}}{1-\eta}C^{(2)}_{W}(1+K_{W}^{2}\xi_{2})\leq 0.25C^{(2)}_{W}; (E) follows from Lemma 9; (E) upper-bounds the summation by considering only the rarest piece and using Γ¯W(i)LU\underline{\Gamma}_{W}^{(i)}\geq LU (see (18)); (E) follows by choosing CW(2)C^{(2)}_{W} large enough so that 0.25KW1LUCW(2)|𝝀|C(1)+DW+ϵ0.25K_{W}^{-1}LUC^{(2)}_{W}\geq|\bm{\lambda}|C^{(1)}+D_{W}+\epsilon.

Case 2 - 𝐱W2\mathbf{x}\in\mathcal{R}_{W}^{2}: From (III-B4) and (III-B4), we can write

QV~W\displaystyle\widetilde{QV}_{W} |𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(4KW2CW(1))\displaystyle\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(4K_{W}^{2}-C^{(1)}_{W}\right)\right.
(1πW(i)γW(i))IW(1)+γW(i)KWξ2IW(2)].\displaystyle\hskip 10.0pt\left.-\left(1-\pi^{(i)}_{W}-\gamma_{W}^{(i)}\right)I_{W}^{(1)}+\gamma^{(i)}_{W}K_{W}\xi_{2}I_{W}^{(2)}\right].

Region W21\mathcal{R}_{W}^{21}: Like in W11\mathcal{R}_{W}^{11}, IW(1),IW(2)I_{W}^{(1)},I_{W}^{(2)} are both zero for large |𝐱|W|\mathbf{x}|_{W}. Since 𝐱W2\mathbf{x}\in\mathcal{R}_{W}^{2}, MW2(1η)<ηc¯WM_{W}-2(1-\eta)<\eta\overline{c}_{W}. This implies that m¯W<ηc¯W+2(1η)c¯W>(1η)c¯W2δW(1η)KWη|𝐱|W2\overline{m}_{W}<\eta\overline{c}_{W}+2(1-\eta)\implies\underline{c}_{W}>(1-\eta)\overline{c}_{W}-2\geq\frac{\delta_{W}(1-\eta)}{K_{W}-\eta}|\mathbf{x}|_{W}-2. Then, for all large |𝐱|W|\mathbf{x}|_{W},

QV~W|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(4KW2CW(1))]\displaystyle\widetilde{QV}_{W}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(4K_{W}^{2}-C^{(1)}_{W}\right)\right]
(ar)|𝝀|C(1)+Γ¯W(r¯)KW[(1π¯W)(0.5CW(1))]\displaystyle\stackrel{{\scriptstyle\textnormal{(ar)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\frac{\underline{\Gamma}_{W}^{(\underline{r})}}{K_{W}}\left[\left(1-\underline{\pi}_{W}\right)\left(-0.5C^{(1)}_{W}\right)\right]
(as)|𝝀|C(1)+KW2Γ¯W(r¯)[0.5CW(1)]\displaystyle\stackrel{{\scriptstyle\textnormal{(as)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+K_{W}^{-2}\underline{\Gamma}_{W}^{(\underline{r})}\left[-0.5C^{(1)}_{W}\right]
(at)|𝝀|C(1)0.5CW(1)KW2Δpc¯W\displaystyle\stackrel{{\scriptstyle\textnormal{(at)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.5C^{(1)}_{W}K_{W}^{-2}\Delta_{p}\underline{c}_{W}
(au)|𝝀|C(1)0.5CW(1)KW2Δp(δW(1η)KWη|𝐱|W2)\displaystyle\stackrel{{\scriptstyle\textnormal{(au)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.5C^{(1)}_{W}K_{W}^{-2}\Delta_{p}\left(\frac{\delta_{W}(1-\eta)}{K_{W}-\eta}|\mathbf{x}|_{W}-2\right)
(av)ϵ.\displaystyle\stackrel{{\scriptstyle\textnormal{(av)}}}{{\mathstrut{\leq}}}-\epsilon.

Here, (E) uses 4KW2CW(1)0.5CW(1)4K_{W}^{2}-C^{(1)}_{W}\leq-0.5C^{(1)}_{W} and then upper-bounds the summation by considering only the rarest-piece, that is denoted by r¯\underline{r}; (E) uses 1π¯WKW11-\underline{\pi}_{W}\geq K_{W}^{-1} (Lemma 2); (E) uses Γ¯W(r¯)Δpc¯W\underline{\Gamma}_{W}^{(\underline{r})}\geq\Delta_{p}\underline{c}_{W} (see (18)); (E) uses c¯WδW(1η)KWη|𝐱|W2\underline{c}_{W}\geq\frac{\delta_{W}(1-\eta)}{K_{W}-\eta}|\mathbf{x}|_{W}-2; (E) uses the fact that |𝐱|W|\mathbf{x}|_{W} is large enough.

Region W22\mathcal{R}_{W}^{22}: Like W12\mathcal{R}_{W}^{12} we use the bounds, IW(1)0-I_{W}^{(1)}\leq 0, IW(2)KWCW(2)I_{W}^{(2)}\leq K_{W}C^{(2)}_{W}, and γW(i)<δW1η\gamma_{W}^{(i)}<\frac{\delta_{W}}{1-\eta} for every iWi\in W (Lemma 12). Then,

QV~W|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(4KW2CW(1))\displaystyle\widetilde{QV}_{W}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(4K_{W}^{2}-C^{(1)}_{W}\right)\right.
+δW1ηKW2ξ2CW(2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right]
(aw)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(0.5CW(1))\displaystyle\stackrel{{\scriptstyle\textnormal{(aw)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(-0.5C^{(1)}_{W}\right)\right.
+δW1ηKW2ξ2CW(2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right]
(ax)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(0.5CW(1)\displaystyle\stackrel{{\scriptstyle\textnormal{(ax)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(-0.5C^{(1)}_{W}\right.\right.
+2δW1ηKW2ξ2CW(2))]\displaystyle\hskip 10.0pt\left.\left.+\frac{2\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right)\right]
(ay)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i))(0.25CW(1))]\displaystyle\stackrel{{\scriptstyle\textnormal{(ay)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[\left(1-\pi^{(i)}_{W}\right)\left(-0.25C^{(1)}_{W}\right)\right]
(az)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[0.125CW(1)]\displaystyle\stackrel{{\scriptstyle\textnormal{(az)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[-0.125C^{(1)}_{W}\right]
(ba)|𝝀|C(1)0.125CW(1)KW1Γ¯W(r¯)\displaystyle\stackrel{{\scriptstyle\textnormal{(ba)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.125C^{(1)}_{W}K_{W}^{-1}\underline{\Gamma}_{W}^{(\underline{r})}
(bb)|𝝀|C(1)0.125CW(1)KW1Δpc¯W\displaystyle\stackrel{{\scriptstyle\textnormal{(bb)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.125C^{(1)}_{W}K_{W}^{-1}\Delta_{p}\underline{c}_{W}
(bc)|𝝀|C(1)0.125CW(1)KW1Δp((CW(3)2)(1η)2KW(KWη)2)\displaystyle\stackrel{{\scriptstyle\textnormal{(bc)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.125C^{(1)}_{W}K_{W}^{-1}\Delta_{p}\left(\frac{(C_{W}^{(3)}-2)(1-\eta)^{2}}{K_{W}(K_{W}-\eta)}-2\right)
(bd)ϵ.\displaystyle\stackrel{{\scriptstyle\textnormal{(bd)}}}{{\mathstrut{\leq}}}-\epsilon.

Here, (E) uses 4KW2CW(1)0.5CW(1)4K_{W}^{2}-C^{(1)}_{W}\leq-0.5C^{(1)}_{W}; (E) uses 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5 for every iWi\in W (Lemma 11); (E) follows from choosing δW\delta_{W} small enough so that 2δW1ηKW2ξ2CW(2)0.25CW(1)\frac{2\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\leq 0.25C^{(1)}_{W}; (E) uses 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5 for every iWi\in W (Lemma 11); (E) upper-bounds the summation by considering only the rarest piece (denoted by r¯\underline{r}); (E) uses Γ¯W(r¯)Δpc¯W\underline{\Gamma}_{W}^{(\underline{r})}\geq\Delta_{p}\underline{c}_{W} (see (18)); (E) uses c¯W(1η)c¯W2\underline{c}_{W}\geq(1-\eta)\overline{c}_{W}-2 and c¯W(CW(3)2)(1η)KW\overline{c}_{W}\geq\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}; (E) follows by choosing CW(3)C_{W}^{(3)} large enough so that 0.125CW(1)KW1Δp((CW(3)2)(1η)2KW(KWη)2)|𝝀|C(1)+ϵ0.125C^{(1)}_{W}K_{W}^{-1}\Delta_{p}\left(\frac{(C_{W}^{(3)}-2)(1-\eta)^{2}}{K_{W}(K_{W}-\eta)}-2\right)\geq|\bm{\lambda}|C^{(1)}+\epsilon.

Region W23\mathcal{R}_{W}^{23}: Like W13\mathcal{R}_{W}^{13}, IW(1)I_{W}^{(1)} and IW(2)I_{W}^{(2)} are both non-zero. We use the bounds, IW(2)KWCW(2)I_{W}^{(2)}\leq K_{W}C^{(2)}_{W}, 4KW2CW(1)04K_{W}^{2}-C^{(1)}_{W}\leq 0, γW(i)<δW1η\gamma_{W}^{(i)}<\frac{\delta_{W}}{1-\eta} for every iWi\in W (Lemma 12). Then,

QV~W|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[(1πW(i)δW1η)CW(2)\displaystyle\widetilde{QV}_{W}\leq|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[-\left(1-\pi^{(i)}_{W}-\frac{\delta_{W}}{1-\eta}\right)C^{(2)}_{W}\right.
+δW1ηKW2ξ2CW(2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\right]
(be)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[0.5CW(2)\displaystyle\stackrel{{\scriptstyle\textnormal{(be)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[-0.5C^{(2)}_{W}\right.
+δW1ηCW(2)(1+KW2ξ2)]\displaystyle\hskip 10.0pt\left.+\frac{\delta_{W}}{1-\eta}C^{(2)}_{W}\left(1+K_{W}^{2}\xi_{2}\right)\right]
(bf)|𝝀|C(1)+iWΓ¯W(i)aW(i)KW[0.25CW(2)]\displaystyle\stackrel{{\scriptstyle\textnormal{(bf)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}+\sum_{i\in W}\frac{\underline{\Gamma}_{W}^{(i)}a_{W}^{(i)}}{K_{W}}\left[-0.25C^{(2)}_{W}\right]
(bg)|𝝀|C(1)0.25KW1LUCW(2)\displaystyle\stackrel{{\scriptstyle\textnormal{(bg)}}}{{\mathstrut{\leq}}}|\bm{\lambda}|C^{(1)}-0.25K_{W}^{-1}LUC^{(2)}_{W}
(bh)ϵ.\displaystyle\stackrel{{\scriptstyle\textnormal{(bh)}}}{{\mathstrut{\leq}}}-\epsilon.

Here, (E) uses 1πW(i)0.51-\pi^{(i)}_{W}\geq 0.5 for every iWi\in W (Lemma 11); (E) follows from choosing δW\delta_{W} small enough so that δW1ηCW(2)(1+KW2ξ2)0.25CW(2)\frac{\delta_{W}}{1-\eta}C^{(2)}_{W}(1+K_{W}^{2}\xi_{2})\leq 0.25C^{(2)}_{W}; (E) upper-bounds the summation by considering only the rarest piece and uses Γ¯W(i)LU\underline{\Gamma}_{W}^{(i)}\geq LU (see (18)); (E) follows by choosing CW(2)C^{(2)}_{W} large enough so that 0.25KW1LUCW(2)|𝝀|C(1)+ϵ0.25K_{W}^{-1}LUC^{(2)}_{W}\geq|\bm{\lambda}|C^{(1)}+\epsilon. ∎

Lemma 15

For any ϵ>0\epsilon^{\prime}>0, there exists a finite set 𝒜\mathcal{A} and a finite constant BB such that

QV(𝐱)ϵ𝟙{𝐱𝒜c}+B𝟙{𝐱𝒜}.\displaystyle{QV}(\mathbf{x})\leq-\epsilon^{\prime}\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}^{c}\}}+B\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}\}}.
Proof:

Fix ϵ>0\epsilon^{\prime}>0. For any ϵ>0\epsilon>0 and any W𝒲W\in\mathcal{W}, it follows from Lemma 14 that QV~Wϵ\widetilde{QV}_{W}\leq-\epsilon, except possibly over 𝒜W\mathcal{A}_{W} where its population and corresponding term QV~W\widetilde{QV}_{W} are bounded from above by NWN_{W} and BW0B_{W}\geq 0 respectively. We can write the state-space as 𝒮=:𝒲𝒮,\mathcal{S}=\bigcup\limits_{\mathcal{H}:\mathcal{H}\subseteq\mathcal{W}}\mathcal{S}_{\mathcal{H}}, where

𝒮\displaystyle\mathcal{S}_{\mathcal{H}} {|𝐱|WNW for all W, and \displaystyle\coloneqq\left\{|\mathbf{x}|_{W}\leq N_{W}\text{ for all }W\in\mathcal{H},\text{ and }\right.
|𝐱|U>NU for all U𝒲}.\displaystyle\hskip 30.0pt\left.|\mathbf{x}|_{U}>N_{U}\text{ for all }U\in\mathcal{W}\setminus\mathcal{H}\right\}.

Case 1 - =\mathcal{H}=\emptyset: Let 𝐱𝒮\mathbf{x}\in\mathcal{S}_{\emptyset}. Since |𝐱|W>NW|\mathbf{x}|_{W}>N_{W} for all W𝒲W\in\mathcal{W}, from Lemma 14, it follows that QV~Wϵ\widetilde{QV}_{W}\leq-\epsilon for all W𝒲W\in\mathcal{W}. From (39), this gives QVϵ{QV}\leq-\epsilon. Choosing ϵϵ\epsilon\geq\epsilon^{\prime} ensures QVϵ{QV}\leq-\epsilon^{\prime}.

Case 2 - =𝒲\mathcal{H}=\mathcal{W}: The set 𝒮𝒲\mathcal{S}_{\mathcal{W}} is finite. Therefore, for any 𝐱𝒮𝒲\mathbf{x}\in\mathcal{S}_{\mathcal{W}}, we can write QVB𝒲max𝐱𝒮𝒲(QV)+<{QV}\leq B_{\mathcal{W}}\coloneqq\max\limits_{\mathbf{x}\in\mathcal{S}_{\mathcal{W}}}\left({QV}\right)^{+}<\infty.

Case 3 - 𝒲\emptyset\neq\mathcal{H}\subsetneq\mathcal{W}: Let 𝐱𝒮\mathbf{x}\in\mathcal{S}_{\mathcal{H}}. We can upper-bound QV{QV} as follows.

QV\displaystyle{QV} =W|𝐱|W|𝐱|QV~W+U𝒲|𝐱|U|𝐱|QV~U\displaystyle=\sum_{W\in\mathcal{H}}\frac{|\mathbf{x}|_{W}}{|\mathbf{x}|}\widetilde{QV}_{W}+\sum_{U\in\mathcal{W}\setminus\mathcal{H}}\frac{|\mathbf{x}|_{U}}{|\mathbf{x}|}\widetilde{QV}_{U}
WNWBWU𝒲|𝐱|U+U𝒲|𝐱|UWNW+U𝒲|𝐱|U(ϵ).\displaystyle\leq\frac{\sum_{W\in\mathcal{H}}N_{W}B_{W}}{\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}+\frac{\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}{\sum_{W\in\mathcal{H}}N_{W}+\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}(-\epsilon).

Note that U𝒲|𝐱|U\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}\rightarrow\infty over the set 𝒮\mathcal{S}_{\mathcal{H}}, which implies

WNWBWU𝒲|𝐱|U0 and U𝒲|𝐱|UWNW+U𝒲|𝐱|U1.\displaystyle\frac{\sum_{W\in\mathcal{H}}N_{W}B_{W}}{\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}\to 0\text{ and }\frac{\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}{\sum_{W\in\mathcal{H}}N_{W}+\sum_{U\in\mathcal{W}\setminus\mathcal{H}}|\mathbf{x}|_{U}}\to 1.

Therefore, for any ϕ>0\phi>0, there exists N=N(ϕ)+N_{\mathcal{H}}=N_{\mathcal{H}}(\phi)\in\mathbb{R}_{+} such that QVϕ+(1ϕ)(ϵ){QV}\leq\phi+(1-\phi)(-\epsilon) for any 𝐱𝒮\mathbf{x}\in\mathcal{S}_{\mathcal{H}} with U𝒲2|𝐱|UN\sum_{U\in\mathcal{W}_{2}}|\mathbf{x}|_{U}\geq N_{\mathcal{H}}. Choosing ϵ=2ϵ\epsilon=2\epsilon^{\prime} and 0<ϕϵ/21+ϵ0<\phi\leq\frac{\epsilon/2}{1+\epsilon} ensures QVϵ{QV}\leq-\epsilon^{\prime}.

For all \mathcal{H} such that 𝒲\emptyset\neq\mathcal{H}\subsetneq\mathcal{W}, let us define

𝒜\displaystyle\mathcal{A}_{\mathcal{H}} 𝒮{U|𝐱|U<N}\displaystyle\coloneqq\mathcal{S}_{\mathcal{H}}\cap\left\{\sum_{U\in\mathcal{H}}|\mathbf{x}|_{U}<N_{\mathcal{H}}\right\} (finite),\displaystyle\quad\text{(finite)},
and then 𝒜\displaystyle\text{and then }\mathcal{A} (ϕ𝒲𝒜)𝒮𝒲\displaystyle\coloneqq\left(\bigcup\limits_{\phi\neq\mathcal{H}\subsetneq\mathcal{W}}\mathcal{A}_{\mathcal{H}}\right)\cup\mathcal{S}_{\mathcal{W}} (finite),\displaystyle\quad\text{(finite)},
B\displaystyle B max𝐱𝒜(QV(𝐱))+<.\displaystyle\coloneqq\max\limits_{\mathbf{x}\in\mathcal{A}}\left({QV}\left(\mathbf{x}\right)\right)^{+}<\infty.

Then, for any state 𝐱\mathbf{x}, we can write

QV(𝐱)ϵ𝟙{𝐱𝒜c}+B𝟙{𝐱𝒜}.{QV}(\mathbf{x})\leq-\epsilon^{\prime}\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}^{c}\}}+B\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}\}}.

establishing the result. ∎

Lemma 15 is the final stage. Combining Lemma 15 and Proposition 6, we conclude that Theorem 1 holds. As a final step, we now illustrate how the constants {CW(1),CW(2),CW(3),δW}W𝒲\{C^{(1)}_{W},C^{(2)}_{W},C_{W}^{(3)},\delta_{W}\}_{W\in\mathcal{W}} can be set consistently.

Setting {CW(1),CW(2),CW(3),δW}W𝒲\{C^{(1)}_{W},C^{(2)}_{W},C_{W}^{(3)},\delta_{W}\}_{W\in\mathcal{W}}: Set some ϵ>0\epsilon^{\prime}>0, ϵ=2ϵ\epsilon=2\epsilon^{\prime}, and η(0,1)\eta\in(0,1).

  • For all W𝒲W\in\mathcal{W}, individually set CW(1)=8KW2C^{(1)}_{W}=8K_{W}^{2}.

  • Set C(1)=maxW𝒲KWCW(1)C^{(1)}=\max_{W\in\mathcal{W}}K_{W}C^{(1)}_{W}.

  • For all W𝒲W\in\mathcal{W}, individually set CW(2)C^{(2)}_{W} such that 0.25KW1LUCW(2)|𝝀|C(1)+DW+ϵ0.25K_{W}^{-1}LUC^{(2)}_{W}\geq|\bm{\lambda}|C^{(1)}+D_{W}+\epsilon.

  • For all W𝒲W\in\mathcal{W}, individually set δW\delta_{W} such that δW0.5(1η)\delta_{W}\leq 0.5(1-\eta), 2δW1ηKW2ξ2CW(2)0.125CW(1)\frac{2\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}C^{(2)}_{W}\leq 0.125C^{(1)}_{W}, and 2δW1ηKW2ξ20.25CW(2)\frac{2\delta_{W}}{1-\eta}K_{W}^{2}\xi_{2}\leq 0.25C^{(2)}_{W}.

  • For all W𝒲W\in\mathcal{W}, set CW(3)C_{W}^{(3)} so that (CW(3)2)(1η)KWNW(1)(|𝝀|+DW,KW,0.5CW(1),ϵ)\frac{(C_{W}^{(3)}-2)(1-\eta)}{K_{W}}\geq N^{(1)}_{W}\big{(}|\bm{\lambda}|+D_{W},K_{W},0.5C^{(1)}_{W},\epsilon\big{)} and 0.125CW(1)KW1Δp((CW(3)2)(1η)2KW(KWη)2)|𝝀|CW(1)+ϵ0.125C^{(1)}_{W}K_{W}^{-1}\Delta_{p}\allowbreak\left(\frac{(C_{W}^{(3)}-2)(1-\eta)^{2}}{K_{W}(K_{W}-\eta)}-2\right)\geq|\bm{\lambda}|C^{(1)}_{W}+\epsilon, where NW(1)N^{(1)}_{W} is specified in Lemma 13.

Appendix F Foster-Lyapunov Theorem

Proposition 6

Let {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} be a continuous-time, time-homogeneous and irreducible Markov chain with state space 𝒮\mathcal{S} and generator matrix QQ. Suppose there exist a non-negative function V:𝒮+V:\mathcal{S}\rightarrow\mathbb{R}_{+}, an ϵ>0\epsilon^{\prime}>0, a finite set 𝒜\mathcal{A}, and a finite constant BB such that {𝐱:V(𝐱)C}\{\mathbf{x}:V(\mathbf{x})\leq C\} is finite for all C+C\in\mathbb{R}_{+}, and the unit-transition drift QV(𝐱){QV}(\mathbf{x}) is upper bounded as

QV(𝐱)ϵ𝟙{𝐱𝒜c}(𝐱)+B𝟙{𝐱𝒜}(𝐱).\displaystyle{QV}(\mathbf{x})\leq-\epsilon^{\prime}\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}^{c}\}}(\mathbf{x})+B\mathbbm{1}{\{\mathbf{x}\in\mathcal{A}\}}(\mathbf{x}).

Then, the process {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} is positive recurrent. The unit-transition drift QV(𝐱){QV}(\mathbf{x}) is given by

QV(𝐱)𝐲𝒮,𝐲𝐱q(𝐱,𝐲)(V(𝐲)V(𝐱)).\displaystyle{QV}(\mathbf{x})\coloneqq\sum\limits_{\mathbf{y}\in\mathcal{S},\mathbf{y}\neq\mathbf{x}}q(\mathbf{x},\mathbf{y})\left(V(\mathbf{y})-V(\mathbf{x})\right). (F.63)

Now, suppose VV^{\prime}, ff, and gg are non-negative functions on 𝒮\mathcal{S}, and suppose QV(𝐱)f(𝐱)+g(𝐱){QV}^{\prime}(\mathbf{x})\leq-f(\mathbf{x})+g(\mathbf{x}) for all 𝐱𝒮\mathbf{x}\in\mathcal{S}. In addition, suppose {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\} is positive-recurrent, so that the means, f¯=πf\overline{f}=\pi f and g¯=πg\overline{g}=\pi g are well-defined. Then f¯g¯\overline{f}\leq\overline{g}. (In particular, if gg is bounded, then g¯\overline{g} is finite, and therefore f¯\overline{f} is finite).

Appendix G List of Important Symbols

  • \mathcal{F}: Master-file.

  • KK: |||\mathcal{F}|.

  • WW: Denotes a file or the corresponding swarm.

  • KWK_{W}: |W||W|.

  • W\mathcal{F}_{W}: Set of all pieces downloadable by swarm-WW.

  • 𝒲\mathcal{W}: Set of all swarms entering the network.

  • λW\lambda_{W}: Arrival rate of an empty swarm-WW peer.

  • 𝝀\bm{\lambda}: (λW:W𝒲)(\lambda_{W}:W\in\mathcal{W}).

  • |𝝀||\bm{\lambda}|: W𝒲λW\sum_{W\in\mathcal{W}}\lambda_{W}.

  • 𝒲W\mathcal{W}_{W}: Ally-set of swarm-WW.

  • xW(S)x_{W}^{(S)}: Number of (W,S)(W,S)-type peers.

  • 𝐱\mathbf{x}: State of the network. See (1).

  • |𝐱|W|\mathbf{x}|_{W}: Number of peers in swarm-WW. See (2).

  • |𝐱||\mathbf{x}|: Number of peers in the network. See (3).

  • LL: Number of contact links with each peer.

  • YoptY_{opt}: Binary parameter for optimistic-unchoke.

  • μ\mu: Ticking rate of tit-for-tat link.

  • μ^\widehat{\mu}: Ticking rate of optimistic-unchoke link.

  • UU: Fixed seed’s upload rate.

  • pp: In a given tit-for-tat contact, pp is the lower-bound on the probability of a peer push-contacting the other peer.

  • RF: Rarest-First.

  • RN: Random-Novel.

  • MS: Mode-Suppression.

  • TMS: Threshold-Mode-Suppression.

  • RFwPMS: Rarest-First with Probabilistic-Mode-Suppression.

  • LPS: Last-Piece Syndrome.

  • FPS: First-Piece Syndrome.

  • RNwPMS: Random-Novel with Probabilistic-Mode-Suppression.

  • ii: Typically used to denotes a piece of some file.

  • πW(i)\pi^{(i)}_{W} / cW(i)c^{(i)}_{W}: Frequency / chunk-count of piece ii. See (4)

  • π¯W\overline{\pi}_{W} / π¯W\underline{\pi}_{W}: Maximum / Minimum chunk-frequency amongst pieces of WW in swarm-WW. See (5).

  • c¯W\overline{c}_{W} / c¯W\underline{c}_{W}: Maximum / Minimum chunk-count amongst pieces of WW in swarm-WW. See (6).

  • PWP_{W}: Total chunk-count in swarm-WW. See (7).

  • mW(i)m_{W}^{(i)}: Mismatch of piece ii in swarm-WW. See (8).

  • m¯W\overline{m}_{W}: Largest-mismatch in swarm-WW. See (9).

  • MWM_{W}: Total-mismatch in swarm-WW. See (10).

  • dW(i)d^{(i)}_{W}: Swarm-WW’s complementary chunk-count of piece-ii. See (12).

  • RWR_{W}: Set of rare pieces in swarm-WW. See (13).

  • RWcR^{c}_{W}: WRWcW\setminus R^{c}_{W}, set of non-rare pieces in swarm-WW.

  • rr: Index for a rare piece of some swarm.

  • nn: Index for a non-rare piece of some swarm.

  • r¯\underline{r}: Index for a piece with the smallest chunk-count.

  • R¯(T^,W,S)\underline{R}_{(\widehat{T},W,S)}: Set of rarest-pieces transferable from revealed cache-profile T^\widehat{T} to (W,S)(W,S)-type peer. See (14).

  • ζW(n)\zeta_{W}^{(n)}: Non-rares sharing factor of swarm-WW. See (15) and (47).

  • A(𝐱,T^,W,S)A(\mathbf{x},\widehat{T},W,S): Transferable set. See Algorithm 1.

  • 𝒮\mathcal{S}: State-space of {𝐱(t):t0}\{\mathbf{x}(t):t\geq 0\}. See (16).

  • Δt\Delta_{t}: 2(L𝟙{Yopt=1})μt+𝟙{Yopt=1}μ^2(L-\mathbbm{1}\{Y_{opt}=1\})\mu t+\mathbbm{1}\{Y_{opt=1}\}\widehat{\mu}.

  • ΓW(i)\Gamma_{W}^{(i)} / Γ¯W(i)\underline{\Gamma}_{W}^{(i)} / Γ¯W(i)\overline{\Gamma}_{W}^{(i)}: Exact / Lower / Upper estimate for aggregate rate at which some ally-peer of swarm-WW push-contacts someone. See (18), (19) and (20).

  • ξ2\xi_{2}: An upper-bound on the ratio Γ¯W(i)/Γ¯W(i)\overline{\Gamma}_{W}^{(i)}/\underline{\Gamma}_{W}^{(i)} for all W𝒲W\in\mathcal{W} and iWi\in W. See (b)).

  • qW(,+)q_{W}^{(\emptyset,+)}: λW\lambda_{W}.

  • qW(S,i+)q_{W}^{(S,i+)}: Aggregate rate at which a (W,S)(W,S)-peer downloads piece ii without departing the system.

  • qW(S,i)q_{W}^{(S,i-)}: Aggregate rate at which a (W,S)(W,S)-peer downloads piece ii and departs the system.

  • 𝒮W1\mathcal{S}^{1}_{W}: {𝐱:RW(𝐱)W}\{\mathbf{x}:R_{W}(\mathbf{x})\subsetneq W\}.

  • 𝒮W2\mathcal{S}^{2}_{W}: {𝐱:RW(𝐱)=W}\{\mathbf{x}:R_{W}(\mathbf{x})=W\}.

  • q¯W(S,n+)\underline{q}_{W}^{(S,n+)}: Lower estimate for rate of (W,S)(W,S)-peer downloading non-rare piece nRWcn\in R^{c}_{W}. See (23).

  • γW(i)\gamma_{W}^{(i)}: S:WS={i}xW(S)|𝐱|W\sum_{S:W\setminus S=\{i\}}\frac{x_{W}^{(S)}}{|\mathbf{x}|_{W}}. That is, the fraction of swarm-WW peers who need only piece ii to depart the system.

  • aW(i)a_{W}^{(i)}: ζW(i)𝟙{iRWc}+𝟙{iRW}\zeta_{W}^{(i)}\mathbbm{1}\{i\in R^{c}_{W}\}+\mathbbm{1}\{i\in R_{W}\}.

  • VV: W𝒲VW(𝐱)\sum_{W\in\mathcal{W}}V_{W}(\mathbf{x}). See (26).

  • VWV_{W}: See (27).

  • W1\mathcal{R}_{W}^{1}: {𝐱:MW2(1η)ηc¯W}\{\mathbf{x}:M_{W}-2(1-\eta)\geq\eta\overline{c}_{W}\}.

  • W2\mathcal{R}_{W}^{2}: 𝒮W1\mathcal{S}\setminus\mathcal{R}_{W}^{1}.

  • ψ¯W\overline{\psi}_{W}:

    (KW2+2KW(MWηc¯W))𝟙[𝐱W1]\displaystyle\left(K_{W}^{2}+2K_{W}\left(M_{W}-\eta\overline{c}_{W}\right)\right)\mathbbm{1}[\mathbf{x}\in\mathcal{R}_{W}^{1}]
    +4KW2𝟙[𝐱W2].\displaystyle\hskip 20.0pt+4K_{W}^{2}\mathbbm{1}[\mathbf{x}\in\mathcal{R}_{W}^{2}].
  • ψ¯W\underline{\psi}_{W}:

    (2(1η)22(1η)(MWηc¯W))𝟙[𝐱W1]\displaystyle\left(2(1-\eta)^{2}-2(1-\eta)\left(M_{W}-\eta\overline{c}_{W}\right)\right)\mathbbm{1}[\mathbf{x}\in\mathcal{R}_{W}^{1}]
    +4KW2𝟙[𝐱W2].\displaystyle\hskip 20.0pt+4K_{W}^{2}\mathbbm{1}[\mathbf{x}\in\mathcal{R}_{W}^{2}].
  • IW(1)I_{W}^{(1)}: CW(2)𝟙{CW(3)2PW}C^{(2)}_{W}\mathbbm{1}\{C_{W}^{(3)}-2\geq P_{W}\}.

  • IW(2)I_{W}^{(2)}: CW(2)KW𝟙{CW(3)+2KWPW}C^{(2)}_{W}K_{W}\mathbbm{1}\{C_{W}^{(3)}+2K_{W}\geq P_{W}\}.

  • ΨW(i)\Psi_{W}^{(i-)}: See (III-A2).

  • ΨW(i+)\Psi_{W}^{(i+)}: See (III-A3).

  • QVQV: See (III-B) and (32).

  • ΨW(i)\Psi_{W}^{(i)}: See (III-B4).

  • QV~W\widetilde{QV}_{W}: Used in upper estimate of QVQV. See (39) and (III-B4).

  • δW\delta_{W}: Small number in (0,1)(0,1) used in Appendix E.

  • NW(1)N_{W}^{(1)}: Used in Lemma 13.

  • 𝒜W\mathcal{A}_{W}, BWB_{W}, NWN_{W}: Used in Lemma 14.

  • \mathcal{H}, 𝒮\mathcal{S}_{\mathcal{H}}, 𝒜\mathcal{A}_{\mathcal{H}}, 𝒜\mathcal{A}, BB, B𝒲B_{\mathcal{W}}: Used in Lemma 15.

Acknowledgment

This work was funded in part, by NSF via grants ECCS2038416, EPCN1608361, EARS1516075, CNS1955777, and CCF2008130 for V. Subramanian, grants EARS1516075, CNS1955777, and CCF2008130 for N. Khan, grant CCF1934986 for M. Moharrami, and by the University of Michigan via Rackham Predoctoral Fellowship for M. Moharrami.

References

  • [1] I. Norros, H. Reittu, and T. Eirola, “On the stability of two-chunk file-sharing systems,” Queueing Systems, vol. 67, pp. 183–206, March 2011.
  • [2] B. Cohen, “Incentives build robustness in BitTorrent,” Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72, June 2003.
  • [3] Sandvine, “The global internet phenomena report covid-19 spotlight,” 2020.
  • [4] L. Massoulie and M. Vojnovic, “Coupon replication systems,” IEEE/ACM Transactions on Networking, vol. 16, pp. 603–616, June 2008.
  • [5] B. Hajek and J. Zhu, “The missing piece syndrome in peer-to-peer communication,” Stochastic Systems, vol. 1, no. 2, pp. 246–273, 2011.
  • [6] J. Zhu and B. Hajek, “Stability of a peer-to-peer communication system,” IEEE Transactions on Information Theory, vol. 58, pp. 4693–4713, July 2012.
  • [7] X. Zhou, S. Ioannidis, and L. Massoulie, “On the stability and optimality of universal swarms,” in ACM SIGMETRICS, SIGMETRICS ’11, pp. 341–352, ACM, June 2011.
  • [8] J. Zhu, I. Stratis, N. Hegde, and L. Massoulié, “Stable and scalable universal swarms,” Distributed Computing, vol. 28, pp. 391–406, December 2015.
  • [9] B. Oğuz, V. Anantharam, and I. Norros, “Stable distributed p2p protocols based on random peer sampling,” IEEE/ACM Transactions on Networking, vol. 23, pp. 1444–1456, October 2015.
  • [10] O. Bilgen and A. B. Wagner, “A new stable peer-to-peer protocol with non-persistent peers,” in IEEE INFOCOM, pp. 1–9, May 2017.
  • [11] V. Reddyvari, P. Parag, and S. Shakkottai, “Mode-Suppression: A simple and provably stable chunk-sharing algorithm for p2p networks,” in IEEE INFOCOM, pp. 2573–2581, April 2018.
  • [12] V. R. Raja, P. Parag, and S. Shakkottai, “Mode-Suppression: A simple, stable and scalable chunk-sharing algorithm for P2P networks,” CoRR, vol. abs/1904.04191, 2019.
  • [13] V. Reddyvari, S. C. Bobbili, P. Parag, and S. Shakkottai, “Mode-Suppression: A simple, stable and scalable chunk-sharing algorithm for p2p networks,” IEEE/ACM Transactions on Networking, pp. 1–12, 2021.
  • [14] D. Qiu and R. Srikant, “Modeling and performance analysis of BitTorrent-like peer-to-peer networks,” SIGCOMM Computer Communication Review, vol. 34, pp. 367–378, August 2004.
  • [15] N. Khan, M. Moharrami, and V. Subramanian, “Stable and efficient piece-selection in multiple swarm BitTorrent-like peer-to-peer networks,” in IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 1153–1162, 2020.
  • [16] D. S. Menasche, A. A. d. A. Rocha, B. Li, D. Towsley, and A. Venkataramani, “Content availability and bundling in swarming systems,” IEEE/ACM Transactions on Networking, vol. 21, pp. 580–593, April 2013.
  • [17] E. de Souza e Silva, R. M. Leão, D. S. Menasché, and D. Towsley, “On the scalability of p2p swarming systems,” Computer Networks, vol. 151, pp. 93–113, Mar 2019.
  • [18] D. X. Mendes, E. de Souza e Silva, D. Menasché, R. Leão, and D. Towsley, “An experimental reality check on the scaling laws of swarming systems,” in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9, 2017.
  • [19] O. Bilgen and A. B. Wagner, “A new stable peer-to-peer protocol with non-persistent peers: The Group Suppression protocol,” IEEE Transactions on Information Theory, vol. 66, no. 1, pp. 614–632, 2020.
  • [20] B. Hajek, Random Processes for Engineers. Cambridge University Press, 2015.
  • [21] R. Srikant and L. Ying, Communication Networks: An Optimization, Control, and Stochastic Networks Perspective. Cambridge University Press, 2014.
  • [22] A. Legout, G. Urvoy-Keller, and P. Michiardi, “Rarest first and choke algorithms are enough,” in ACM SIGCOMM, IMC ’06, pp. 203–216, ACM, 2006.
[Uncaptioned image] Nouman Khan (Member, IEEE) is a Ph.D candidate in the department of Electrical Engineering and Computer Science (EECS) at the University of Michigan, Ann Arbor, MI, USA. He received the B.S. degree in Electronic Engineering from the GIK Institute of Engineering Sciences and Technology, Topi, KPK, Pakistan, in 2014 and the M.S. degree in Electrical and Computer Engineering from the University of Michigan, Ann Arbor, MI, USA in 2019. His research interests include stochastic systems and their analysis and control.
[Uncaptioned image] Mehrdad Moharrami is a TRIPODS Postdoctoral Research Fellow at the University of Illinois at Urbana Champaign. He received his B.Sc. from the Sharif University of Technology, Iran, in Mathematics, as well as Electrical Engineering. He holds an M.Sc. in Electrical Engineering and an M.Sc. in Mathematics from the University of Michigan. He received his Ph.D. in Electrical Engineering in 2020. His research interests include Markov decision processes, reinforcement learning, and random graph models for economics, learning, and computation.
[Uncaptioned image] Vijay Subramanian (Senior Member, IEEE) received the Ph.D. degree in electrical engineering from the University of Illinois at Urbana-Champaign, Champaign, IL, USA, in 1999. He was a Researcher with Motorola Inc., and also with Hamilton Institute, Maynooth, Ireland, for a few years following which he was a Research Faculty with the Electrical Engineering and Computer Science (EECS) Department, Northwestern University, Evanston, IL, USA. In 2014, he joined the University of Michigan, Ann Arbor, MI, USA, where he is currently an Associate Professor with the EECS Department. His research interests are in stochastic analysis, random graphs, game theory, and mechanism design with applications to social, as well as economic and technological networks.