<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000200685</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-2-2747</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[System Modeling for Priority Schemes in Managed Peer-to-Peer Networks]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rivero-Angeles]]></surname>
<given-names><![CDATA[Mario E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Orea-Flores]]></surname>
<given-names><![CDATA[Izlian Yolanda]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional CIC ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Politécnico Nacional UPIITA ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>2</numero>
<fpage>685</fpage>
<lpage>716</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000200685&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000200685&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000200685&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In Peer-to-Peer (P2P) networks it is not uncommon to find users that have initiated a file transfer and decide to leave the system before the end of the download. This is a particularly harmful behavior due to the resources (bandwidth or energy) wasted in such an aborted process. This negative effect is amplified when the system&#8217;s conditions are such that the peers are not downloading at the maximum capacity. This is because in these conditions, there are not enough peers uploading the file, and a part of the bandwidth is wasted on peers that do not share their resources to the network once they leave the system. In this paper, the case of managed P2P networks is of special interest. As such, the variability in the transfer rates, such as the download and upload rates, is expected to be much less than in the case of the unmanaged P2P network. The limit case, where these transfer rates are constant is considered as an alternative to the exponential distribution. Additionally, two priority schemes are presented for a BitTorrent-based P2P network where the peers that are more likely to remain longer in the system are served first.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Managed peer to peer network]]></kwd>
<kwd lng="en"><![CDATA[priority scheme]]></kwd>
<kwd lng="en"><![CDATA[performance evaluation]]></kwd>
<kwd lng="en"><![CDATA[transfer rates modeling]]></kwd>
<kwd lng="en"><![CDATA[BitTorrent]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rand]]></surname>
<given-names><![CDATA[D.G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dreber]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ellingsen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Fudenberg]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Nowak]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Positive interactions promote public cooperation]]></article-title>
<source><![CDATA[Science Magazine]]></source>
<year>2009</year>
<volume>325</volume>
<page-range>1272-5</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Srikant]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling and performance analysis of BitTorrent-Like Peer-to-Peer networks]]></article-title>
<source><![CDATA[Proceedings ACM SIGCOMM]]></source>
<year>2004</year>
<volume>3</volume>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Fgueiredo]]></surname>
<given-names><![CDATA[D.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaiswal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kurose]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Towsley]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling Peer-Peer file sharing systems]]></article-title>
<source><![CDATA[Proceedings IEEE INFOCOM]]></source>
<year>2003</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>2188-98</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petrovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Large scale analysis of the eDonkey P2P file sharing system]]></article-title>
<source><![CDATA[Proceedings IEEE INFOCOM]]></source>
<year>2009</year>
<page-range>2746-50</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kesidis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Mortazavi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Konstantopoulos]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An epidemiological model for file-sharing with BitTorrent-like incentives: The case of a fixed peer population]]></article-title>
<source><![CDATA[Proceedings IEEE Globecom]]></source>
<year>2006</year>
<volume>1</volume>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Efthymiopoulos]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Tompros]]></surname>
<given-names><![CDATA[S.L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enabling live video streaming services realization in telecommunication networks using P2P technology]]></article-title>
<source><![CDATA[International Journal of Communication Systems]]></source>
<year>2011</year>
<volume>24</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1354-74</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sing-Ling]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing P2P live streaming performance by balancing description distribution and available forwarding bandwidth in P2P streaming network]]></article-title>
<source><![CDATA[International Journal of Communication Systems]]></source>
<year>2011</year>
<volume>24</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>568-85</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ying-Xun]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chin-Feng]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A personalized mobile IPTV system with seamless video reconstruction algorithm in cloud networks]]></article-title>
<source><![CDATA[International Journal of Communication Systems]]></source>
<year>2011</year>
<volume>24</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1375-87</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lloret]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Atenas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Canovas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A QoE management system to improve the IPTV network]]></article-title>
<source><![CDATA[International Journal of Communication Systems]]></source>
<year>2011</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>118-38</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jing-cheng]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Yue-bin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu-huai]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[An incentive mechanism using game theory for P2P networks]]></source>
<year>2009</year>
<volume>2</volume>
<numero>25-26</numero>
<conf-name><![CDATA[ IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing]]></conf-name>
<conf-loc> </conf-loc>
<issue>25-26</issue>
<page-range>715-8</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bocek]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shann]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hausheer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Stiller]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks]]></source>
<year>2008</year>
<conf-name><![CDATA[ IEEE International Symposium on Parallel and Distributed Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[W.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Papadopoulos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Psounis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance analysis of BitTorrent-Like systems with heterogeneous users]]></article-title>
<source><![CDATA[Elseiver Performance Evaluation]]></source>
<year>2007</year>
<volume>64</volume>
<numero>9-12</numero>
<issue>9-12</issue>
<page-range>876-91</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Veciana]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fairness, incentives and performance in peer-to-peer networks]]></source>
<year>2003</year>
<conf-name><![CDATA[ Forty-First Annual Allerton Conference on Communication, Control and Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>749-58</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramachandran]]></surname>
<given-names><![CDATA[K.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Sikdar]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A queuing model for evaluating the transfer latency of peer-to-peer systems]]></article-title>
<source><![CDATA[Parallel and Distributed Systems, IEEE Transactions]]></source>
<year>2010</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>367-78</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weijie]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lui]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the optimal replication strategy in p2p-vod systems: Characterization and evaluation]]></article-title>
<source><![CDATA[Parallel and Distributed Systems, IEEE Transactions]]></source>
<year>2012</year>
<volume>23</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1492-503</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mizanian]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Vasef]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Analoui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bandwidth modeling and estimation in peer to peer networks]]></article-title>
<source><![CDATA[International Journal of Computer Networks &amp; Communications]]></source>
<year>2010</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>65-83</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kotevski]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Pece]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Modeling Framework for Performance Analysis of P2P Live Video Streaming Systems]]></article-title>
<source><![CDATA[ICT Innovations]]></source>
<year>2011</year>
<page-range>215-25</page-range><publisher-loc><![CDATA[Berlin Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
