Bandwidth Trading in Unstructured P2P Content Distribution Networks

Size: px
Start display at page:

Download "Bandwidth Trading in Unstructured P2P Content Distribution Networks"

Transcription

1 Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, Abstract Bandwidth trading schemes give peers an incentive to provide upload bandwidth to other peers in a P2P network for fast file distribution. A popular example is the tit-fortat strategy used in the BitTorrent protocol. Although this game theoretical scheme provides an incentive to peers to contribute resources to the network it does not prevent unfairness and the performances of peers vary considerably. Therefore, we propose two new trading schemes, which are based on pricing. One uses explicit price information whereas the other scheme uses the download rates from other peers as the price. For both distributed algorithms the stable point provides a fair resource allocation as well as a Nash Equilibrium. I.e. fairness is preserved although peers behave selfishly and try to maximise their own download rates only. We compare both pricing schemes with BitTorrent in simulations of static and dynamic networks. The pricing algorithms outperform BitTorrent with respect to fairness. With explicit prices the download rates converge faster to the fair equilibrium than with implicit ones. Introduction The Peer-to-Peer (P2P) paradigm offers obvious advantages for the fast distribution of large content in the Internet. While in the client/server architecture the total load must be carried by the server(s), it is distributed across the users in a P2P network. But the cooperation of peers is not a matter of course. P2P faces the problem of free-riding [] where peers consume resources solely without contributing anything to the network. Therefore, reputation systems and/or incentive mechanisms are implemented in P2P applications frequently. A very interesting approach is the so-called swarming principle. Here, the file of interest is fragmented into blocks. When a peer completes the download of a single block, it offers it to other peers that so far have not downloaded this block. Thus, peers exchange blocks with each other although they did not finish the download of the complete file. Therefore, the resources in the P2P network are used more efficiently and the network depends not solely on the altruistic or cooperative behaviour of the peers. The swarming principle rather exploits the two-way interest of peers in different blocks, which the other one provides. Since most of the peers behave selfishly and are interested in maximising their own download rates, the mutual interest results in peers, which bargain for bandwidth with each other. Hence, the swarming principle supports also content distribution in a non-cooperative environment. A very popular example is the BitTorrent protocol [3] where a peer uploads to others from which it receives the highest download rates. This strategy is inspired by the tit-for-tat principle that is well known from game theory. Here, a player adopts the strategy, which his opponent used in the previous round. By cooperating in the first step the tit-fortat strategy proved very effective in the repeated prisoner s dilemma []. Unfortunately, simulation-based studies for BitTorrent reveal a high variability in the download rates [7] and unfairness in terms of the ratio of uploaded to downloaded data [2]. This means that some peers are better off by using the tit-for-tat strategy than the others. These results raise two questions. Firstly, from the user perspective: Does another strategy exist which outperforms BitTorrent s tit-for-tat strategy? This means with such kind of strategy a user can increase its download performance. Since the total capacity in the network is finite this happens at the expense of others. Secondly, from the angle of a protocol designer: Does a strategy exist which ensures fairness between peers although peers behave selfishly? This work tries to answer the second question. Thereby, we compare BitTorrent s titfor-tat mechanism with two bandwidth trading schemes. In both trading schemes we assume that a peer knows its upload capacity and can freely distribute this upload capacity over its connections to other peers. In the first proposed trading scheme each peer receives a (virtual) payment for

2 uploading data to others. These payments control the sending rates in the future. Peers with higher price offers will receive higher rates whereas the rate will decrease for peers with lower price offers. Furthermore, the total payments a peer can afford is limited to its own upload capacity. We will show that such an algorithm converges to a fair distribution of the available upload bandwidth in the network weighted by the upload bandwidth of a peer. In the second trading scheme peers use their download rates from other peers as the payment information. Thus, no explicit pricing must be implemented in the protocol. It should be noted that a trading scheme is only one of the building blocks of a P2P protocol. Since every peer starts with no block at the beginning a good implementation has to ensure that new peers have a decent chance to finish their first block fast. Therefore, altruistic behaviour of some peers is essential or further incentive mechanisms are needed in the network (e.g. based on the reputation of peers). Furthermore, the selection of blocks to download is important for the future exchange with other peers. The BitTorrent protocol implements a rarest-first strategy where each peer determines the rarest block of its neighbours and requests this block if available. Different papers show the efficiency of this model analytically [] or by simulation [2]. Additionally, new coding schemes resolve the block selection problem [5]. By exchanging linear combinations of all the blocks a peer stores, the probability that two peers have nothing of interest for the other one is reduced significantly. We concentrate in this work on the discussion and the detailed comparison of different trading schemes. The paper is structured as follows. Section 2 discusses the trading schemes and the Nash Equilibria of them. In Section 3 the setup of the simulation is described. The results of the simulations are presented and discussed in Section 4. Section 5 concludes the paper. 2 Trading Schemes We study bandwidth trading schemes which provide an incentive to contribute to the P2P content distribution network. Each peer tries to maximise its own download rate by appropriately allocating its upload bandwidth to other peers. The first scheme is a game theoretical approach and is used in the BitTorrent protocol. The other two schemes are based on pricing models. Thereby, both pricing algorithms use rate control at the application layer. In an real implementation this can be realised by the application putting different amounts of data into the socket buffers of the TCP connections. A more sophisticated approach is to schedule the traffic directly at the queue of the network interface card, e.g. with Linux Traffic Control [6]. 2. BitTorrent s Tit-for-Tat In BitTorrent each peer controls to whom it uploads data. This is called unchoking. A peer uploads to a fixed number of other peers (the default value is four). Thereby, a peer chooses the upload candidates from which it has the highest download rates. This tit-for-tat strategy is run every ten seconds by every peer, whereby the download rates are determined by a moving average over the last 2 seconds. To discover new peers with better performance a so-called optimistic unchoke is done additionally. Here, a peer is unchoked independently of its rate. The optimistic unchoke is changed every 3 seconds to provide enough time to be possibly unchoked by the remote peer in return. When a peer has completed the download of the file, unchoking is based on its upload rates to the connected peers. This unchoking algorithm gives peers an incentive to upload data to the network since it increases the chance to be unchoked by others with increasing upload capacity. Details about the BitTorrent protocol can be found in [3]. 2.2 Resource Pricing We proposed in [4] a distributed algorithm for a fair resource allocation. This algorithm can be applied to P2P content distribution networks whereas the upload bandwidth is the scarce resource. In our model each peer pays a virtual price for using upload bandwidth at a remote peer. The sum of all prices a peer can afford to pay is bounded by its willingness-to-pay. For P2P file-sharing this willingnessto-pay is the upload bandwidth of a peer. This model gives an incentive to contribute to the network since a peer with a high upload capacity can offer higher prices than others and therefore receives a higher download rate. The distributed algorithm is explained in the following. Assume each peer allocates an upload capacity to the P2P application which is denoted as at peer p. Furthermore, peer p can upload to a number of peers which are interested in a block which peer p offers. This set of peers is denoted as the service customers SC(p) of p. Each interested peer offers a price λ c per unit of upload bandwidth. Based on these prices peer p sets the upload rate x pc to the remote peer c. Furthermore, the price offer of an interested peer is proportional to its upload capacity. Hence, the resource pricing algorithm is the set of differential equations RESOURCE PRICING (RP) : ( d dt x pc(t) =γx pc (t) λ c (t) x ) pd(t)λ d (t) λ c (t) = () C c p SP(c) x pc(t), (2)

3 where SP(c) denotes the set of peers in which peer c is interested in. Thus, the denominator of (2) is the total download rate of peer c. (Furthermore, two exceptional cases have to be considered in a real implementation. When the total download rate of a peer is zero, we set λ c (t) =C c. And secondly, when λ c (t) > but x pc (t) = we set x pc (t +)=ɛ where ɛ is a small positive constant.) () can be interpreted as follows. Since λ c is the price per unit of bandwidth, the product x pc λ c is the total price which is payed by peer c. According to this the sum in the numerator of () represents the total revenue of peer p. Multiplying the total revenue by xpc specifies the average revenue peer p generates by allocating the rate x pc. If the total price of peer c is higher than the average price (i.e. the left term in the bracket of () is greater than the right one), then peer p increases its upload rate to c and decreases it otherwise. Further on, when we assume that two peers receive different download rates although they provide the same upload capacity to the network we see from (2) that the peer with the smaller download rate will offer a higher price per unit in the future than the other one. Hence, its download rate will increase. The equilibrium of the system (-2) can be determined by setting () to zero. Thus, the total download rate for a peer c in equilibrium is [4] y c = p SP(c) x pc = C c p P d SC C d, (3) where SC is the set of peers which currently download the file and P is the set of all peers in the network, i.e. also including the seeds, peers which stay altruistically in the network after completion of their download. It can be seen from (3) that the download rates of the peers are proportional to their upload capacity and the bandwidth allocation is fair weighted by the contribution of each peer. When no peer behaves altruistically (3) reduces to y c = C c. 2.3 Reciprocal Rate Control The resource pricing algorithm in Section 2.2 assumes the correct signalling of the price offers. Thus, an implementation must ensure that malicious users cannot forge their price offers to obtain higher download rates. When this is not possible in a specific application, an upload rate control algorithm can only be based on the download rates of the connected peers (like in BitTorrent). In the context of pricing mechanisms the download rates can be interpreted as the price a remote peer is willing to pay for the upload bandwidth allocated to it. In the resource pricing algorithm the total price paid by the remote peer is the product x pc λ c. Hence, by replacing x pc λ c with the rate x cp in () we obtain a reciprocal rate control algorithm using an implicit pricing signal RECIPROCAL RATE CONTROL (RRC) : ( d dt x pc(t) =γ x cp (t) x pc (t) x ) dp(t) In the following we prove that the proposed algorithm fully utilises the upload capacity under the assumption that in the previous step all resources are used. Therefore, we sum up over all upload rates of peer p x pc (t +) (5) = (4) ( ( x pc (t)+γ x cp (t) x pc (t) x )) dp(t) (6) = x pc (t)+γ x cp (t) x pc (t) x dp(t) = + γ (7) x cp (t) C x dp(t) p (8) = (9) This means when we start with an initial rate allocation which is efficient (e.g. by splitting the upload capacity evenly over all connections) all following rate allocations are efficient as well. Furthermore, we prove that the stable point of the distributed algorithm is efficient by setting (4) to zero = γ (x cp x x ) dp pc () x pc = x x cp () dp x pc = (2) The upload rates in equilibrium can be computed with () and (2) x cp = x x dp pc (3) x cp = x pc (4) In equilibrium a peer uses its full upload bandwidth (cp. (2)) and downloads from a specific peer with the same rate as it is uploading (cp. (4)). Thus, with (2) and (4) the total download rate over all connections is equal to the upload capacity of the peer.

4 The RRC algorithm is restricted to peers that did not complete the download already. It ensures that a peer receives at least the rate, which it provides to the network. Seeds cannot run the RRC algorithm and have to use other rules for their upload. (E.g. these peers can upload to peers, which have nothing at all.) Therefore, an advantage of explicit prices used in Section 2.2 compared to implicit prices is that fairness is preserved also over the altruistically contributed resources in the network. 2.4 Nash Equilibrium Most peers in a P2P network behave selfishly and try to maximise their performance only. Therefore, we can interpret the trading of bandwidth as a non-cooperative game and study the Nash equilibrium. In a Nash equilibrium no peer gains by only changing its strategy while all other players keep their strategy unchanged. This means a Nash equilibrium corresponds to a set of strategies where every player has found the best response to the actions of the other players []. [] studies the Nash equilibrium for the BitTorrent protocol. Thereby, each peer can choose its upload bandwidth between and its physical upload capacity. Since a higher upload bandwidth is associated with a higher cost, a peer is interested primarily in maximising its download rate while also minimising its cost at the same time. [] shows that a Nash equilibrium exists for networks consisting of groups (with a group size larger than the number of unchokes plus one) of peers where peers belonging to the same group have identical upload bandwidths. In this situation the best case for a peer is to upload to other peers in its group. The threshold to be unchoked is exactly the upload bandwidth divided by the number of unchokes (which is assumed to be equal for all peers). Therefore, a peer will be choked by the peers of its group when it reduces its upload bandwidth. This results in inferior performance. On the other hand a Nash equilibrium does not exist when peers have different upload capacities as it is demonstrated by an example in []. In the following we study the Nash equilibria for the two proposed pricing schemes in steady-state. Assume for Resource Pricing that a peer cannot forge its price offer λ. It can be seen directly from (3) that any reduction of upload capacity will result in a decrease of the download rate. When maximising the download rate has priority over minimising the upload cost every peer will upload with its physical upload capacity. Thus, the steady-state of the system (-2) is a Nash equilibrium. Similarly, the existence of the Nash equilibrium for Reciprocal Rate Control can be shown for the steady-state with (4). Since a peer receives exactly the rate, which it provides to the other peer, it gains nothing by reducing its upload bandwidth. 3 Simulation Setup Because of the computational complexity of the simulations at packet-level we restrict our analysis to the application layer. Therefore, the TCP behaviour is omitted. We assume a user sets the maximal upload bandwidth of his P2P application between zero and his physical upload capacity. Furthermore, we assume this is the bottleneck in the network. Since the utilisation in the core of the network is low [9] and access lines are often asymmetric favouring the downlink we believe this is a reasonable assumption. The bandwidth trading schemes depend highly on the number of neighbours and especially on the number of connections where both sides are interested in data blocks of the other side. Thus, the schemes depend on the topology generated by the protocol and the implemented block selection algorithm. To concentrate on the trading schemes in the simulations we omit the block selection algorithm and assume connected peers are always interested in blocks of each other. The overlay topology is constructed in our simulations according the original BitTorrent implementation [3]. Here, a peer asks a so-called tracker, a centralised component that stores information about all peers, for a list of other peers in the network. The tracker returns a random subset of length to the requesting peer. Hence, a peer opens a new connection to a remote peer based on the list returned by the tracker or when a remote peer asks for it. In our simulations we consider static and dynamic P2P networks. In the static case all N P peers are registered at the tracker. Then each peer obtains a peer list from the tracker. If we assume that all peers accept every incoming connection request, a peer p iterates through its peer list and opens connections. Furthermore, one more connection is established when a remote peer which is unknown to p, i.e. not on the peer list of p, contacts it. The probability that x peers contact p is B(x) and follows the binomial distribution ( ) NP B(x) = P x ( P ) NP x, (5) x where P is the probability that peer p is on the peer list of a peer q under the assumption that q is not on the list of p. The probability that a specific peer id is returned by the tracker is based on the hypergeometric distribution and is (N P ) 2 N ( R NP ) = N N P, (6) R when we assume a tracker does not return the id of the requesting peer. Thus, we can compute P with P = N ( R N P N P ). (7)

5 The expectation value E[N C ] of the number of connections N C of a peer is the sum of and the expectation value E[X] of the random variable X which is distributed according (5). Therefore, E[N C ]= + E[X] (8) ( = +(N P ) N ) R (9) N P N P ( = + N ) R (2) N P 2 (2) The approximation in (2) holds if N P. For the simulations with dynamics we model the peer behaviour as a Poisson process, where the interarrival times between peers and the session times of peers are exponentially distributed. The expectation value of the number of peers in the network is E[N P ]= λ µ which depends on the mean arrival rate λ and the mean service rate µ. We assume the tracker returns valid information of online peers only. Since the Poisson process is memoryless a peer which is asked to open a new connection by a remote peer has a remaining session time distributed with mean µ. Therefore, the rate of closing connections for a peer is µ. On the other hand new peers will open a connection to peer p. The probability that peer p is chosen by a new peer is given by (6) and can be estimated with E[N P ]. New peers enter with the rate of λ. Therefore, the rate of opening new N connections is λ R E[N P ]. Hence, the expectation value of the number of connections is λ E[N C ] = (E[N P ] ) µ (22) λ N λ R (23) µ µ = (24) The results of the expected number of connections in the static and the dynamic network in (2) and (24), respectively, are different and deviate by a factor of 2. This has to be taken into account for the simulations where fairness is studied for different values of. 4 Simulation Results 4. Static networks One major difference of the two pricing schemes to Bit- Torrent s tit-for-tat strategy is their convergence to a steadystate. To demonstrate the basic functionality of all algorithms we run a simulation for a small network of peers with homogeneous upload capacities of C =. The superposition of the download rates of the peers is depicted in Figure. Whereas the download rates of the peers oscillate between.4 and.6 for BitTorrent, the rates converge fast to a fair allocation for the Resource Pricing and the Reciprocal Rate Control algorithm where each peer receives exactly its upload capacity. Especially the performance of BitTorrent depends on the number of neighbours. To study the influence of the topology on the download performance simulations are run with varying parameter. The network population was peers, each peer starting with a small random offset to avoid synchronisation effects. The simulation consisted of iterations of the respective algorithm and was repeated 5 times. We set γ =. for RP and RRC and ɛ =.C/N C. The empirical cumulative distribution function (CDF) of the mean download rate over the iterations is depicted over all runs in Figure 2. To compare the three algorithms Figure 2 shows the results for download rates between 5 and.5. With BitTorrent s tit-for-tat algorithm peers receive highly different download rates while providing the same upload capacity. To see its performance in detail Figure 3 shows the CDF for download rates of.5 to 2. Tit-fortat depends on the number of neighbours. With =2a peer has on average four connections only and therefore no choice in selecting peers. This results in a poor performance where % of the peers receive half of what they provide. Download rates are distributed more equitably with increasing.for =all peers receive a mean download rate of ±2% of their upload capacity, whereas this percentage decreases to ±% for =5. Nonetheless, the distribution of download rates with BitTorrent is not as uniformly distributed as with the two proposed pricing algorithms. Nearly all peers receive download rates between 8 and.2 with both algorithms and values of > 2. Furthermore, the download rates at the end of each simulation were equal to one for every peer. This means the pricing algorithms converged. Thus, the differences of the CDFs for different values of in Figure 2(b) and 2(c) are due to differences in the rate of convergence. Because of the slight differences observed in the results we analyse the convergence properties for the case of heterogeneous peers. For the next simulation we consider heterogeneous peers with upload capacities of integers between and. The capacity is determined randomly at the start of the simulation. With a total of peers there are on average peers with the same capacity in the network. The download performance of each peer is measured by the ratio of mean download rate to upload capacity. The CDF of the download performances is depicted for BitTorrent in Figure 4. As expected the download performances of the peers vary more as compared to the simulation results with homogeneous peers. In all four curves some peers receive more

6 Download Rate Download Rate Download Rate Round Round Round (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure. Superposition of the download rates of peers for different trading schemes =.3.2. =.3.2. = (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure 2. for varying parameter =.2. = / Upload Capacity Upload Capacity Figure 3. CDF for BitTorrent Figure 4. CDF for BitTorrent with heterogeneous peers Figure 5. Superposition of mean download rates for Bit- Torrent ( =)

7 5 =5 5 5 Weighted Fairness Index =5 = Weighted Fairness Index =5 = N =5 R N =2 R Weighted Fairness Index N =5 R = =5 N =2 R = Iteration Iteration Iteration (a) BitTorrent (b) Resource Pricing (c) Reciprocal Rate Control Figure 6. Weighted Fairness Index in heterogeneous network than the double compared to what they provide. On the other hand the performance with =5isgood: Only around % of the peers receive a download to upload ratio of less than. This proportion rises to about 5% for =and 3% for =5. The curves of the CDFs for =and =5in Figure 4 rise very slowly for values greater than.5. This suggests that a small fraction of peers have a better performance compared to all others. By looking at Figure 5 we can identify these peers. It can be seen that for Bit- Torrent peers with a upload capacity of C =receive a mean download rate larger than one whereas the peers with C =receive mostly a rate lower than their contribution. One reason for this is the optimistic unchoke since a low capacity peer gains more than it invests compared to a high capacity peer. Another reason is the incapability to find the right match which also explains the different performances between peers with the same capacity. Because of space limitations we omitted the CDFs for the two pricing schemes. They outperform BitTorrent with respect to fairness. The ratio of the mean download rate to the upload capacity is over 8 for all peers for > 2. Only for =2fairness deteriorates and around 2% of the peers have a ratio of less than 5. Since the performances of the pricing algorithms depend on the convergence we measured a variant [4] of Jain s Fairness Index [8] extended to weighted fairness over the simulation time. The results in Figure 6 show for > 2 the convergence to a fair resource allocation for both proposed algorithms in less than 7 iterations. The convergence is better with increasing and better for Resource Pricing than with Reciprocal Rate Control. When =2we observed no convergence even for higher number of iterations. In this case some peers receive an unfair download rate because its small neighbourhood cannot raise the adequate rate with their upload capacity. The weighted fairness index of BitTorrent is below for all studied values of. (It should be noted that a fairness index of corresponds for example to an allocation where % of the peers receive nothing at all and the remaining 9% receive equal rates.) 4.2 Dynamic networks We conducted simulations also for dynamic networks where interarrival times between peers and session times of peers are negative exponentially distributed. We set = and compare the performance for two cases with the same average peer population of. We assume the respective algorithm is run per unit time. The resulting CDFs are depicted in Figure 7(a) and Figure 7(b). Compared to the static case the fairness deteriorates for dynamic networks. Nevertheless, with an arrival process of peers with a rate /λ =, i.e. on average iterations of the algorithm before a new peer enters, the two pricing schemes achieve nearly uniformly distributed download performances for heterogeneous peers. For /λ =infigure 7(b) the CDF shows higher variability in the achieved download performance for the two proposed algorithms. Thereby, the results for Reciprocal Rate Control deteriorate more than for Resource Pricing comparing it with the results in Figure 7(a). Especially for /λ =, /µ = some peers stay only a very short time in the network and merely run the trading algorithm a few times. This results in poor download performance as it can be seen from Figure 7(c). Here, the minima of the download performances of peers with similar session times are measured for time intervals of 25 time units. For all schemes the minimal download performance increases with the session times of the peers. But the increase is more pronounced for the two trading schemes. After around 5 time units the minimal download performance in the net-

8 BitTorrent Resource Pricing Reciprocal Rate Control / Upload Capacity BitTorrent Resource Pricing Reciprocal Rate Control / Upload Capacity MIN( / Upload Capacity )..7.5 BitTorrent Resource Pricing Reciprocal Rate Control Peer Session Time (a) CDF for /λ =, /µ = (b) CDF for /λ =, /µ = (c) Minimal download performance (/λ =, /µ = ) Figure 7. Results for dynamic networks work is above. This indicates that the two distributed algorithms show improved fairness between peers also in varying networks compared to BitTorrent. It should also be noted that the update interval of the pricing algorithms can be adapted to the dynamics of the network as long as the download rates can be estimated accurately. 5 Conclusion BitTorrent s tit-for-tat strategy gives peers an incentive to contribute upload bandwidth to the network. But it cannot avoid unfairness between peers with respect to the experienced download performance. Especially when peers have a small number of connections download rates vary considerably. Furthermore, peers with small upload capacities compared to others receive considerably more than what they contribute to the network. This paper presents two alternatives to improve fairness. Both use price information to control the upload rates at the application layer. We derive that the proposed distributed algorithms achieve in equilibrium a fair and efficient allocation of the total upload bandwidth contributed by the peers in the network. Furthermore, the steady-states of the two schemes provide Nash equilibria. In simulations both algorithms show good convergence and better fairness as the tit-for-tat strategy used in BitTorrent. Each of the two proposed algorithms has its advantages. Reciprocal Rate Control is robust against malicious users since it uses the download rates from other peers as the price information. These cannot be forged. On the other hand Resource Pricing, which uses explicit prices, preserves fairness also for the allocation of the altruistically contributed resources offered by the peers that completed their download already. Additionally, it shows slightly better convergence than Reciprocal Rate Control in the simulations. References [] E. Adar and B. A. Huberman. Free riding on Gnutella. First Monday, 5(), Oct. 2. [2] A. R. Bharambe, C. Herley, and V. N. Padmanabhan. Analyzing and improving BitTorrent performance. Technical Report MSR-TR-25-3, Microsoft Research, 25. [3] B. Cohen. Incentives build robustness in BitTorrent. In Proc. st Workshop on Economics of Peer-to-Peer Systems, Berkeley, June 23. [4] K. Eger and U. Killat. Fair resource allocation in Peer-to- Peer networks. In Proc. 26 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 6), Calgary, Canada, July 26. [5] C. Gkantsidis and P. Rodriguez. Network coding for large scale content distribution. In Proc. IEEE INFOCOM, Miami, March 25. [6] B. Hubert, T. Graf, G. Maxwell, R. van Mook, M. van Oosterhout, P. Schroeder, J. Spaans, and P. Larroy. Linux Advanced Routing & Traffic Control HOWTO. Documentation from [7] M. Izal, G. Urvoy-Keller, E. W. Biersack, P. Felber, A. A. Hamra, and L. Garcés-Erice. Dissecting BitTorrent: Five months in a torrent s lifetime. In Passive and Active Mesurements, pages, April 24. [8] R. Jain. The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley & Sons, 99. [9] A. Odlyzko. Data networks are lightly utilized, and will stay that way. Review of Network Economics, 2(3):2 237, September 23. [] M. J. Osborne. An Introduction to Game Theory. Oxford University Press, 24. [] R. Qiu, D. Srikant. Modeling and performance analysis of BitTorrent-like peer-to-peer networks. Computer Communication Review, 34(4): , 24.

TCPeer: Rate Control in P2P over IP Networks

TCPeer: Rate Control in P2P over IP Networks TCPeer: Rate Control in P2P over IP Networks Kolja Eger and Ulrich Killat Institute of Communication Networks Hamburg University of Technology (TUHH) 21071 Hamburg, Germany {eger, killat}@tu-harburg.de

More information

Scalability of the BitTorrent P2P Application

Scalability of the BitTorrent P2P Application Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2007; 00:1 7 [Version: 2002/09/19 v2.02] Performance Analysis and Improvement for BitTorrent-like File Sharing

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

The Design Trade-offs of BitTorrent-like File Sharing Protocols

The Design Trade-offs of BitTorrent-like File Sharing Protocols The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

P2P Content Distribution

P2P Content Distribution , University of Hannover Wolf-Tilo Balke and Wolf Siberski 28.11.2007 *With slides from K. Wehrle (RWTH), A. Bharambe (CMU), P. Rodriguez, P. Chou (MSRC), Chiu (CUHK) Peer-to-Peer Systems and Applications,

More information

Design Space Analysis for Modeling Incentives in Distributed Systems

Design Space Analysis for Modeling Incentives in Distributed Systems Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed

More information

Delft University of Technology Parallel and Distributed Systems Report Series. Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds

Delft University of Technology Parallel and Distributed Systems Report Series. Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds Delft University of Technology Parallel and Distributed Systems Report Series Bandwidth Allocation in BitTorrent-like VoD Systems under Flashcrowds Lucia D Acunto, Tamás Vinkó, Henk Sips ldacunto@tudelftnl

More information

Dissecting BitTorrent: Five Months in a Torrent s Lifetime

Dissecting BitTorrent: Five Months in a Torrent s Lifetime Dissecting BitTorrent: Five Months in a Torrent s Lifetime M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garcés-Erice Institut Eurecom, 2229, route des Crêtes, 694 Sophia-Antipolis,

More information

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction

More information

THE PEER-TO-PEER (P2P) paradigm has proved to be

THE PEER-TO-PEER (P2P) paradigm has proved to be 140 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 2, SECOND QUARTER 2010 A Survey of BitTorrent Performance Raymond Lei Xia and Jogesh K. Muppala, Senior Member, IEEE Abstract Since its inception,

More information

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured

More information

Performance Analysis of BitTorrent Protocol

Performance Analysis of BitTorrent Protocol Performance Analysis of BitTorrent Protocol Parul Sharma Department of Computer Science Engineering sharma.parul111@gmail.com Anuja Bhakuni Department of Computer Science Engineering anuja.bhakuni13@gmail.com

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

Cache Capacity Allocation to Overlay Swarms

Cache Capacity Allocation to Overlay Swarms Cache Capacity Allocation to Overlay Swarms Ioanna Papafili 1, George D. Stamoulis 1, Frank Lehrieder 2, Benjamin Kleine 2, Simon Oechsner 2, 1 Athens University of Economics and Business, Athens, Greece

More information

Performance Improvements of Peer-to-Peer File Sharing

Performance Improvements of Peer-to-Peer File Sharing 0 Performance Improvements of Peer-to-Peer File Sharing Dongyu Qiu Concordia University Canada 1. Introduction In recent years, Peer-to-Peer (P2P) applications, in which peers serve as both clients and

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

ARTICLE IN PRESS. Journal of Network and Computer Applications

ARTICLE IN PRESS. Journal of Network and Computer Applications Journal of Network and Computer Applications 32 (29) 666 683 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca Principles

More information

Analyzing and Improving a BitTorrent Network s Performance Mechanisms

Analyzing and Improving a BitTorrent Network s Performance Mechanisms Analyzing and Improving a BitTorrent Network s Performance Mechanisms Ashwin R. Bharambe Cormac Herley Venkata N. Padmanabhan Carnegie Mellon University Microsoft Research Microsoft Research Abstract In

More information

Improving BitTorrent: A Simple Approach

Improving BitTorrent: A Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown

More information

Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks

Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks Modeling, Analysis and Improvement for BitTorrent-Like File Sharing etworks Ye Tian, Di Wu, and Kam Wing g Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin,.T.,

More information

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis Chih-Lin HU* and Zong-Xian LU Department of Communication Engineering, National Central University,

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design Bin Fan Dept. of Computer Science Eng. The Chinese University of Hong Kong Email: bfan@cse.cuhk.edu.hk Dah-Ming Chiu Dept. of Information

More information

FairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University

FairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University FairTorrent: Bringing Fairness to Peer-to-Peer s Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University Technical Report CUCS-29-8 May, 28 {asherman, nieh, cliff}@cs.columbia.edu

More information

A game-theoretic framework for ISPs interactions in the context of Economic Traffic Management

A game-theoretic framework for ISPs interactions in the context of Economic Traffic Management Euro-NF International Workshop on Traffic and Congestion Control for the Future Internet Volos, Greece, April 1 st, 2011 A game-theoretic framework for ISPs interactions in the context of Economic Traffic

More information

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems Fan Bin Dah-Ming Chiu John C.S. Lui Abstract In this paper, we present the mathematical analysis of two important

More information

Application Layer: P2P File Distribution

Application Layer: P2P File Distribution Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP

More information

Understanding and Deconstructing BitTorrent Performance

Understanding and Deconstructing BitTorrent Performance Understanding and Deconstructing BitTorrent Performance Ashwin R. Bharambe Carnegie Mellon University Cormac Herley Venkata N. Padmanabhan Microsoft Research January 25 Technical Report MSR-TR-25-3 Microsoft

More information

inria , version 1-6 Sep 2006

inria , version 1-6 Sep 2006 Rarest First and Choke Algorithms Are Enough Arnaud Legout I.N.R.I.A. Sophia Antipolis France arnaud.legout@sophia.inria.fr G. Urvoy-Keller and P. Michiardi Institut Eurecom Sophia Antipolis France {Guillaume.Urvoy,Pietro.Michiardi}@eurecom.fr

More information

Introduction to P P Networks

Introduction to P P Networks Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?

More information

Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing

Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Oberseminar TU München, Germany December 2007 Networks Neuron Networks DISTRIBUTED

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

Improving the Download Time of BitTorrent-like Systems

Improving the Download Time of BitTorrent-like Systems Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract

More information

Peer-to-Peer Applications Reading: 9.4

Peer-to-Peer Applications Reading: 9.4 Peer-to-Peer Applications Reading: 9.4 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained from other sources,

More information

Over-contribution in discretionary databases

Over-contribution in discretionary databases Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All

Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All ABSTRACT Ben Leong, Youming Wang, Su Wen, Cristina Carbunaru, Yong Meng Teo National University of Singapore 13 Computing Drive

More information

Design Space Analysis for Modeling Incentives in Distributed Systems

Design Space Analysis for Modeling Incentives in Distributed Systems Design Space Analysis for Modeling Incentives in Distributed Systems Rameez Rahman Delft University of Technology Delft, The Netherlands rrameez@gmail.com Johan Pouwelse Delft University of Technology

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

PEER-TO-PEER (P2P)applications have shown their popularity

PEER-TO-PEER (P2P)applications have shown their popularity 954 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL 9, NO 7, JULY 2008 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement Minglu Li, Jiadi Yu,

More information

BitTorrent for Really Selfish Peers T4T Trading over Cycles

BitTorrent for Really Selfish Peers T4T Trading over Cycles Semester Thesis BitTorrent for Really Selfish Peers T4T Trading over Cycles Roger Odermatt oroger@student.ethz.ch Professor: Dr. Roger Wattenhofer Advisor: Raphael Eidenbenz Department of Information Technology

More information

Performance Analysis of Peer-to-Peer Networks for File Distribution

Performance Analysis of Peer-to-Peer Networks for File Distribution Performance Analysis of Peer-to-Peer Networks for File Distribution Ernst W. Biersack, Pablo Rodriguez, and Pascal Felber Institut EURECOM, France {erbi,felber}@eurecom.fr Microsoft Research, UK pablo@microsoft.com

More information

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.

EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously. EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication

More information

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh

A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network. * M. Padmavathi, ** R. M. Suresh A Fuzzy Approach For Piece Selection In Bit Torrent Like Peer To Peer Network * M. Padmavathi, ** R. M. Suresh * Assistant Professor, Department of Information Technology, RMD Engineering College, PO box

More information

Cooperative End-to-end content distribution. Márk Jelasity

Cooperative End-to-end content distribution. Márk Jelasity Cooperative End-to-end content distribution Márk Jelasity Content distribution So far we looked at search Content distribution is about allowing clients (peers) to actually get a file or other data after

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Game Theory. Presented by Hakim Weatherspoon

Game Theory. Presented by Hakim Weatherspoon Game Theory Presented by Hakim Weatherspoon Game Theory Main Question: Can we cheat (and get away with it)? BitTorrent P2P file distribution tool designed with incentives for contribution Users contribute

More information

Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing

Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Jukka K. Nurminen, Janne Nöyränen Nokia Research Center {jukka.k.nurminen, janne.noyranen}@nokia.com Abstract Battery consumption

More information

On Feasibility of P2P Traffic Control through Network Performance Manipulation

On Feasibility of P2P Traffic Control through Network Performance Manipulation THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida

More information

Further extensions to the Wigan architecture are discussed in this thesis, including possible means of handling data updates.

Further extensions to the Wigan architecture are discussed in this thesis, including possible means of handling data updates. COMPUTING SCIENCE A BitTorrent-based Peer-to-Peer Database Server J. Colquhoun TECHNICAL REPORT SERIES No. CS-TR-1135 January, 2009 TECHNICAL REPORT SERIES No. CS-TR-1135 January, 2009 A BitTorrent-based

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

The Importance of History in a Media Delivery System

The Importance of History in a Media Delivery System The Importance of History in a Media Delivery System Richard J. Dunn, Steven D. Gribble, Henry M. Levy, John Zahorjan University of Washington E-mail: {rdunn,gribble,levy,zahorjan}@cs.washington.edu Abstract

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

On Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks

On Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks On Fairness, Optimal Download Performance and Proportional Replication in Peer-to-Peer Networks Saurabh Tewari, Leonard Kleinrock Computer Science Department, University of California at Los Angeles, 4403

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

COOPERATION-AWARE TOPOLOGY CONTROL

COOPERATION-AWARE TOPOLOGY CONTROL COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc

More information

Joe Wingbermuehle, (A paper written under the guidance of Prof. Raj Jain)

Joe Wingbermuehle, (A paper written under the guidance of Prof. Raj Jain) 1 of 11 5/4/2011 4:49 PM Joe Wingbermuehle, wingbej@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The Auto-Pipe system allows one to evaluate various resource mappings and topologies

More information

Countering Hidden-Action Attacks on Networked Systems

Countering Hidden-Action Attacks on Networked Systems Countering on Networked Systems University of Cambridge Workshop on the Economics of Information Security, 2005 Outline Motivation 1 Motivation 2 3 4 Motivation Asymmetric information inspires a class

More information

New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization

New Technique to Improve BitTorrent Performance Based on Application Layer Traffic Optimization International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 1 (Jan. 2015) New Technique to Improve BitTorrent Performance Based on Application Layer Traffic

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

arxiv:cs.ni/ v1 21 Nov 2006

arxiv:cs.ni/ v1 21 Nov 2006 Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout Nikitas Liogkas Eddie Kohler Lixia Zhang I.N.R.I.A. University of California, Los Angeles Sophia Antipolis, France Los Angeles, CA,

More information

Public Review for Design Choices for Content Distribution in P2P Networks. Anwar Al Hamra and Pascal Felber

Public Review for Design Choices for Content Distribution in P2P Networks. Anwar Al Hamra and Pascal Felber Public Review for Design Choices for Content Distribution in P2P Networks Anwar Al Hamra and Pascal Felber Peer-to-peer file distribution accounts for a tremendous amount of bandwidth consumption on today's

More information

Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems

Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems Wireless Personal Communication manuscript No. DOI 1.17/s11277-15-2391-5 Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems Husnu S. Narman Md. Shohrab Hossain Mohammed Atiquzzaman

More information

OPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES

OPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES OPTIMIZATION QUESTIONS IN BITTORRENT COMMUNITIES Elvira Antal Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering and Automation, E-mail: antal.elvira@gamf.kefo.hu Abstract

More information

Net Neutrality and Inflation of Traffic

Net Neutrality and Inflation of Traffic Introduction Net Neutrality and Inflation of Traffic Martin Peitz (MaCCI, University of Mannheim and CERRE) Florian Schuett (TILEC, CentER, Tilburg University) Symposium in Honor of Jean Tirole The Hague,

More information

SALSA: Super-Peer Assisted Live Streaming Architecture

SALSA: Super-Peer Assisted Live Streaming Architecture SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Robustness of BitTorrent-like VoD Protocols

Robustness of BitTorrent-like VoD Protocols Acta Cybernetica 22 (26) 673 685. Robustness of BitTorrent-like VoD Protocols Tamás Vinkó Abstract Besides server supported solutions for Video-on-demand, approaches based on distributed systems such as

More information

P2P VoD Systems: Modelling and Performance

P2P VoD Systems: Modelling and Performance P2P VoD Systems: Modelling and Performance Samuli Aalto, Aalto University, Finland Pasi Lassila, Aalto University, Finland Niklas Raatikainen, HIIT, Finland Petri Savolainen, HIIT, Finland Sasu Tarkoma,

More information

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example

More information

Changing the Unchoking Policy for an Enhnaced BitTorrent

Changing the Unchoking Policy for an Enhnaced BitTorrent 1/1 Changing the Unchoking Policy for an Enhnaced BitTorrent Vaggelis Atlidakis, Mema Roussopoulos and Alex Delis Department of Informatics and Telecommunications, University of Athens, 15748, Greece April

More information

Improving Performance of BitTorrent Network through Incentive Mechanism

Improving Performance of BitTorrent Network through Incentive Mechanism San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Summer 2011 Improving Performance of BitTorrent Network through Incentive Mechanism Mingzhe Li San Jose

More information

On Randomness in ISP-friendly P2P Applications

On Randomness in ISP-friendly P2P Applications 2012 26th IEEE International Conference on Advanced Information Networking and Applications On Randomness in ISP-friendly P2P Applications S M Saif Shams Simula Research Lab University of Oslo Oslo, Norway

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

BiToS: Enhancing BitTorrent for Supporting Streaming Applications

BiToS: Enhancing BitTorrent for Supporting Streaming Applications BiToS: Enhancing BitTorrent for Supporting Streaming Applications Aggelos Vlavianos, Marios Iliofotou and Michalis Faloutsos Department of Computer Science and Engineering University of California Riverside

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Introduction to Distributed Computing Systems

Introduction to Distributed Computing Systems Introduction to Distributed Computing Systems Alexandru Iosup Parallel and Distributed Systems Group Delft University of Technology Some material kindly provided by the PDS group. 1 What is a Distributed

More information

Congestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica

Congestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica Congestion Control Brighten Godfrey CS 538 January 31 2018 Based in part on slides by Ion Stoica Announcements A starting point: the sliding window protocol TCP flow control Make sure receiving end can

More information

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

CSE 486/586 Distributed Systems Peer-to-Peer Architectures CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How

More information

P2P Streaming: a Study on the Use of Advertisements as Incentives

P2P Streaming: a Study on the Use of Advertisements as Incentives P2P Streaming: a Study on the Use of Advertisements as Incentives Bo-Chun Wang, Alix L.H. Chow, Leana Golubchik Department of Computer Science, University of Southern California Nokia Research Center,

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Serving Niche Video-on-Demand Content in a Managed P2P Environment

Serving Niche Video-on-Demand Content in a Managed P2P Environment 1 Serving Niche Video-on-Demand Content in a Managed P2P Environment Eli Brosh 1, Chitra Agastya 2, John Morales 2, Vishal Misra 1, Dan Rubenstein 1 affaddr Department of Computer Science, Columbia University

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 5, OCTOBER 2012 1361 FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems Alex Sherman, Jason Nieh, and Clifford

More information

IEEE Proof Print Version

IEEE Proof Print Version IEEE/ACM TRANSACTIONS ON NETWORKING 1 Random Access Game and Medium Access Control Design Lijun Chen, Member, IEEE, Steven H. Low, Fellow, IEEE, and John C. Doyle Abstract Motivated partially by a control-theoretic

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

BitTorrent Optimization Techniques. (from various online sources)

BitTorrent Optimization Techniques. (from various online sources) BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp

More information

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017 CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things

More information