Do incentives build robustness in BitTorrent?

Similar documents
Do incentives build robustness in BitTorrent?

Game Theory. Presented by Hakim Weatherspoon

Lecture 17: Peer-to-Peer System and BitTorrent

building BitTyrant, a (more) strategic BitTorrent client

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Design Space Analysis for Modeling Incentives in Distributed Systems

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

BitTorrent from swarms to collectives

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems

Extreme Computing. BitTorrent and incentive-based overlay networks.

Peer-to-Peer Applications Reading: 9.4

Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

BitTorrent for Really Selfish Peers T4T Trading over Cycles

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Bandwidth Trading in Unstructured P2P Content Distribution Networks

CSE 486/586 Distributed Systems Peer-to-Peer Architectures

BitTorrent Optimization Techniques. (from various online sources)

Distributed Data Management. Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

A Case For OneSwarm. Tom Anderson University of Washington.

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

Cooperation in Open Distributed Systems. Stefan Schmid

T-Chain: A General Incentive Scheme for Cooperative Computing

Changing the Unchoking Policy for an Enhnaced BitTorrent

P2P Content Distribution

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

inria , version 1-6 Sep 2006

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2 Solutions

Changing the Unchoking Policy for an Enhanced Bittorrent

Attacks and exploits targeting BitTorrent and other P2P file sharing networks

CS 3516: Advanced Computer Networks

FairTorrent: Bringing Fairness to Peer-to-Peer Systems. Alex Sherman, Jason Nieh, and Cliff Stein Department of Computer Science Columbia University

Performance Analysis and Improvement for BitTorrent-like File Sharing Systems

Modeling Leechers Attack in BitTorrent

CS5412: TORRENTS AND TIT-FOR-TAT

Performance Improvements of Peer-to-Peer File Sharing

Traffic Patterns in Peer-to-Peer-Networking. Christian Schindelhauer. joint work with Amir Alsbih Thomas Janson

Scalability of the BitTorrent P2P Application

EnhancedBit: Unleashing the Potential of the Unchoking Policy in the BitTorrent Protocol

improving the performance and robustness of P2P live streaming with Contracts

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

Introduction to P P Networks

Application Layer: P2P File Distribution

DISTRIBUTED SYSTEMS CSCI 4963/ /4/2015

5. Bi&orrent and coopera0on

BitTorrent for the Less Privileged

Fault-Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks

Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks

Distributed Data Management

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

Distributed Data Management

CS 3516: Computer Networks

A Measurement Study of Attacks on BitTorrent Seeds

Some Peers Are More Equal than Others! Stefan Schmid

Last Lecture SMTP. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Ngo 1

A Trace Study of BitTorrent P2P File Distribution with Downloading-Side Performance Measurement and Analysis

On Feasibility of P2P Traffic Control through Network Performance Manipulation

Understanding BitTorrent: An Experimental Perspective

arxiv:cs.ni/ v1 21 Nov 2006

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Improving Peer-to-Peer File Distribution: Winner Doesn t Have to Take All

Modeling, Analysis and Improvement for BitTorrent-Like File Sharing Networks

BitRiver: Final Report

Enforcing collaboration in a collaborative content distribution network

THE PEER-TO-PEER (P2P) paradigm has proved to be

Understanding BitTorrent: An Experimental Perspective

The Design Trade-offs of BitTorrent-like File Sharing Protocols

Design Space Analysis for Modeling Incentives in Distributed Systems

Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing

Improving Performance of BitTorrent Network through Incentive Mechanism

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

Cooperative End-to-end content distribution. Márk Jelasity

Robustness of BitTorrent-like VoD Protocols

P2P content distribution Jukka K. Nurminen

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Computer Systems Engineering: Spring Quiz 2

BitTorrent. Internet Technologies and Applications

Reti P2P per file distribution: BitTorrent

Second Generation P2P Live Streaming

Dissecting BitTorrent: Five Months in a Torrent s Lifetime

Improving BitTorrent: A Simple Approach

Lecture 21 P2P. Napster. Centralized Index. Napster. Gnutella. Peer-to-Peer Model March 16, Overview:

What If Some Peers Are More Equal than Others?

The Lotus-Eater Attack

Bittorrent simulator in Erlang

Performance Analysis of BitTorrent Protocol

Peer-to-Peer Streaming Systems. Behzad Akbari

P2P content distribution

Peer to Peer and Overlay Networks

A Survey Of Free-Ridingbehaviour In Peer-To-Peer Networks

INVESTIGATING AND IMPROVING BITTORRENT S PIECE AND NEIGHBOR SELECTION ALGORITHMS

BiToS: Enhancing BitTorrent for Supporting Streaming Applications

Incentive-Aware Routing in DTNs

Introduction to Distributed Computing Systems

Lecture 8: Application Layer P2P Applications and DHTs

Cache Capacity Allocation to Overlay Swarms

Peer to Peer Systems and Probabilistic Protocols

ARTICLE IN PRESS. Journal of Network and Computer Applications

METHODOLOGIES TO IMPROVE THE PERFORMANCE OF A BITTORRENT LIKE PEER TO PEER NETWORK

PEER-TO-PEER (P2P)applications have shown their popularity

Transcription:

Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu

Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion

Introduction 3 MAIN IDEA Free-Ride Consuming resources without contribution Fundamental problem in P2P systems BitTorrent Use Tit-for-Tat strategy for discouraging free-riders Upload more download more Question Can we cheat? Download without upload or upload less

Introduction 4 CONTRIBUTION Contribution Shows BitTorrent is not robust with strategic users Model altruism in BitTorrent BitTyrant Upload more than necessary A selfish and strategic BitTorrent client Carefully select peers and contribution rates Raise the download speed with the same contribution

BitTorrent Overview 5 WHAT IS IT? A P2P file sharing protocol Bulk data transfer Account for 40%~70% of internet traffic (Feb.2009) True P2P: no single server Tracker: keep track of active peers in the swarm Swarm: all peers sharing a torrent Seeds: users with a complete file

BitTorrent Overview 6 How does it work(1)? Torrent file name file size fingerprint url of tracker swarm tracker Pieces are redistributed by peers

BitTorrent Overview 7 How does it work(2)? Swarm Active set size Active set Local neighborhood

BitTorrent Overview 8 Tit-for-Tat strategy THE STRATEGY! Famous in game theory ( Prisoners Dilemma) Do what others did to him in the last round Forgiveness: cooperate with a few lucky guys In the BitTorrent context Grant upload capacity to n best uploaders + ω optimistically unchoked peers Active set size = n Equal split rate = upload capacity / (n + ω)? Match same rate and difficult to be stable Choke (stop uploading to) peers that perform badly

BitTorrent Overview 9 Sounds Great? A fast client with 90 total upload capacity Will choose top 2 uploaders and 1 unchoker peer received rate sent rate For machine has LOTS of upload Most peers are slower, even top ones Top 20 30 Pay much more than get For slow machines Have no chance to be top 10 30 9 0 However, could get welfare Waste all the upload capacity For all peers in the active set Get the same reciprocation sent rate = equal split rate Altruism Why not just send at rate 10? Unchoker 1 (capacity) 30 For the 3 rd one He will get paid if he sent 1 more

Modeling Altruism in BitTorrent 10 OBSERVATION (1) Measure of altruism The sub-liner growth suggests the unfairness (high capacity)

Modeling Altruism in BitTorrent 11 OBSERVATION (2) Altruism: any upload contribution that can be withdrawn without loss in download performance slow clients never get reciprocated fast clients pay more

Modeling Altruism in BitTorrent 12 OBSERVATION (3) reciprocation prob>99% when equal rate>14 KB/s Reciprocation probability as a function of equal split rate The sharp jumps due to the increase of active set size 0.6r ω

Building BitTyrant 13 A SELFISH CLIENT! Based on Azureus Client : Most popular in traces Main idea Exploit unfairness and minimize altruism Dynamically choose how many and which peers to send data Mechanisms Choose best peers Deviate from equal split

Building BitTyrant 14 ALGORITHM Maintain d p and u p of peer p d p : download performance from p u p : rate to earn reciprocation from p Algorithm Rank peers by the ratio d p /u p Select top ones until reach the upload capacity

Building BitTyrant 15 EXAMPLE A BitTyrant client with 21 total upload capacity peer received rate required send rate benefit/cost ratio 9 3 3.00 20 10 2.00 Sum=21 10 8 1.25 1 1.6 0.625

Building BitTyrant 16 SOME PROBLEM? Similar to knapsack problem It s a greedy algorithm, not the best Maybe dynamic programming method is better peer received rate required send rate benefit/cost ratio 20 10 2.00 15 8 1.88 12 8 1.5 A client with 17 total upload capacity Greedy: 20 Dynamic: 27

Building BitTyrant 17 REASONS? Faster in large scale system More robust to Estimation error Churn and other network conditions Even they re true Still could be improved

Building BitTyrant 18 ESTIMATION? Initialization According to the bandwidth distribution After each round If peer p not unchoke us: u p 1 + δ u p If peer p unchoke us: d p observed rate If peer p unchoke us for the last r rounds: u p 1 γ u p

Evaluation 19 Single BitTyrant user SINGLE AND MULTIPLE USERS The CDF of the ratio of download time The median of performance is a factor of 1.72

Evaluation 20 SINGLE AND MULTIPLE USERS Multiple BitTyrant users Strategic: use BitTyrant and contribute excess capacity The performance will be improved Strategic & selfish: doesn t give back excess capacity The performance decreases dramatically

Conclusion 21 WHAT THE PAPER HAS DONE Shows BitTorrent is not robust with strategic users Model altruism in BitTorrent BitTyrant Exploit altruism in BitTorrent The performance of a client is improved

THANKS FOR YOUR TIME QUESTIONS?

Appendix 23 Improved algorithm IMPROVEMENT! Select top ones until exceed the upload capacity Suppose there are n peers in the active set Allocate u i to peer i, where i < n Allocate the rest to peer n