Improving Bittorrent: a Simple Approach

Total Page:16

File Type:pdf, Size:1020Kb

Improving Bittorrent: a Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Leana Golubchik Vishal Misra Univ. of Southern California Univ. of Southern California Columbia University Abstract factor in facilitating free-riding. And, to the best of our Measurement studies have shown that real world BitTor- knowledge, there is no other study that explores this. rent (BT) systems exhibit high seed capacity. Thus, ap- Moreover, as illustrated later in the paper, a leecher’s propriate use of seed capacity can have a significant ef- progress through the file downloading process is not uni- fect on BT performance. Moreover, seed capacity is also form. The progress is slower at the beginning, when hav- easily exploitable by free-riders, and such free-riding ing few chunks prevents a node from being selected for clients exist out in the wild today. In this paper, we pro- uploads through tit-for-tat. It can also be slower at the pose a simple and scalable approach that makes more in- end, when it is more difficult to find peers with the few telligent use of seed capacity by hurting free-riders, with- remaining pieces of needed data (although provisions ex- out their explicit identification, while improving the per- ist to aid with that). In both cases, seeds can contribute formance of contributing nodes. The effectiveness of our significantly, as they are no longer playing the tit-for-tat approach is studied via extensive simulations. game, and they have all the data pieces. Thus, intuitively, appropriate use of seeding capacity can lead to overall 1 Introduction system performance improvements. An important thread in the design and evaluation of P2P Given this, our main idea in this work is to explore systems has been the provision of incentives for nodes to alternative approaches for seeds to contribute their up- contribute their resources to the P2P system. An inter- load capacity to the system, with the goal of degrad- esting aspect of BitTorrent (BT) [4], that makes it stand ing free-rider performance while (if possible) improving out in that respect, is the “forcing” of peers to share their other leechers’ performance. The contributions of this resource while attempting to complete their downloads, paper are as follows: i.e., through the tit-for-tat [4] mechanism – this is done • We propose several simple approaches to modify- “locally” and without the need for centralized or dis- ing the seeds’ uploading algorithms, where the goal tributed mechanisms for implementing an incentive sys- is to (a) discourage free-riding behavior and at the tem. Although this works nicely, there are still oppor- same time (b) improve (or at least not degrade) the tunities for free-riders (i.e., peers who do not contribute performance of other leechers. The details of these resources) to download files (e.g., [8, 13, 16]). These op- schemes are given in Section 3. portunities exist in two forms: (1) capacity provided by • leechers (nodes who have not completed their download We show that simple schemes can provide signif- yet) through the optimistic unchoking mechanism (used icantly poorer performance to free-riders while at by leechers to probe for new downloading opportunities), the same time improving (or not hurting) the other and (2) capacity provided by seeds (nodes that have com- leechers’ performance. We do this through a de- pleted their download but continue to contribute their up- tailed simulation study in Section 4. The poor free- loading capacity to the system). rider performance should serve as a deterrent, which We believe that sufficient evidence exists to indicate will encourage free-riders to contribute resources. that the following two statements are true: (1) opportu- 2 Motivation nities for free-riding hurt the system’s performance, and In BT, nodes join the system (after receiving “start- (2) a non-negligible number of nodes in BT stay around up” information from the tracker) and begin requesting as seeds for some time after completing their downloads. chunks of data from their neighbors. Nodes that do not That is, many users would only contribute resources if have a complete copy of the file are termed “leechers” their performance was quite poor. And, the capacity pro- and those that do are termed “seeds”. Nodes that do vided by the seeds can significantly contribute to provid- not contribute their upload capacities are termed “free- ing reasonable performance for the free-riders. There- riders”. Each leecher i picks a number (typically 5) of fore, we believe that the behavior of seeds is an important nodes to whose requests it will respond with an upload of an appropriate chunk, i.e., these nodes are “unchoked”. Motivating Example A subset of these nodes (typically 4) are picked based Consider the following example, where we have two on the tit-for-tat mechanism, i.e., those neighbors that classes of nodes and each class is defined by its upload have provided the best service (in terms of download capacity and download capacity. Class 1 nodes are con- rate) to node i recently. And a subset (typically 1) is tributing nodes, and Class 2 nodes are free-riders (with picked randomly, i.e., they are “optimistically unchoked” bandwidth settings given in Table 1). Figure 1 depicts (to explore better neighbors). Seeds also pick a subset of the download times of each class as a function of av- neighbors (typically 5), and upload data to them. In past erage seeding time with 20% of users being free-riders versions of BT, seeds chose neighbors that could down- and with no free-riders. These results are obtained by load data from them the fastest. In a more recent protocol simulation (refer to Section 4) with settings given in Ta- (as described in [10]) the seeding capacity is distributed ble 2. The 20% free-riders case illustrates that the av- more uniformly to the neighboring peers. These choices erage download time of free-riders is more sensitive to are re-evaluated periodically. the seeding time than that of the contributing leechers. A number of research studies (e.g., [8, 14, 11, 12, 16]), For example, with no seeding time, the average down- have focused on the fairness, robustness, and perfor- load time is 162.33 mins and 632.07 mins for contribut- mance characteristics of BT, mainly resulting from the ing leechers and free-riders, respectively. When the av- tit-for-tat mechanism. However, very few studies have erage seeding time is increased to 60 mins, the average considered the effects of seeding behavior. Given typical download time is reduced to 101.89 mins (≈ 37% speed user behavior and the design of most BT clients, seeding up) for contributing leechers and 172.63 mins (≈ 73% is a typical behavior in the BT system. Many users may speed up) for free-riders. This suggests that alternative leave their clients running after completing downloads, approaches to distributing seeds’ upload capacity might possibly due to users not monitoring their clients during lead to significant effects on free-riders’ performance the download. Also, some sharing communities enforce while possibly improving (or at least not hurting) the per- a download/upload ratio to enable seeding. Real-world formance of contributing leechers. Moreover, if we de- measurements such as (e.g. [1, 3, 6, 7, 10, 15]) also sug- grade free-riders’ performance sufficiently, many of them gest that there exist a significant number of seeds in most might choose to become contributing leechers, i.e., in or- torrents; they suggest that there is a large variety of seed- der to obtain reasonable performance. This would result ing capacity in real-world torrents – some of the torrents in an improved overall system performance – e.g., with measured have twice as many seeds as they do leechers. an average seeding time of 60 mins (in our example), the Availability of seeding capacity can have a significant average download time can decrease from 101.89 mins effect on BT, e.g., it can compensate for the asymmetric to 69.84 mins (≈ 31% speed up), if free-riders contribute bandwidth scenarios in the Internet. At the same time, resources similarly to other users. it can degrade the fairness and incentive properties of the Table 1: Class Description (example) system, as free-riders can finish their downloads with rea- Class Fraction Download Capacity Upload Capacity sonable performance by relying on the seeds. (Not only 1 (Contributing) 80% 5000kbps 512kbps 2 (Free-Riders) 20% 5000kbps 0kbps do they not contribute to the systems’ upload capacity, they also effectively reduce the performance gains that 700 seeds provide.) Thus, intuitively, appropriate use of seed- 600 ing capacity can have a significant effect on performance 5000kbps/512kbps (No Free-Riders) 500 of both, contributing leechers as well as free-riders. 5000kbps/512kbps (20% Free-Riders) 400 Free-Riders (20% Free-Riders) Existing studies on seeding behavior (e.g., [2, 9]) mainly concentrate on the initial seeding behavior, such 300 as reducing sending of duplicate data. To the best of our 200 knowledge, no studies focus on how to better utilize the 100 Average Download Time (min) service capacity provided by the seeds. In this paper, we 0 focus on precisely that. Specifically, we ask a simple 0 20 40 60 80 100 120 140 160 180 Average Seed Time (min) question – how can the seeding capacity be better uti- lized to discourage free-riding behavior and at the same Figure 1: Download Time vs Seed Time (2 Classes) time improve performance of contributing leechers. We now give a motivating example to illustrate opportunities 3 Proposed Approach for “closing a loop-hole” in BT which might encourage We explore the following simple approach to modifying free-riding behavior.
Recommended publications
  • Electronic Evidence in Torrent Copyright Cases
    ARTICLE: ELECTRONIC EVIDENCE IN TORRENT COPYRIGHT By Thomas M. Dunlap and CASES Nicholas A. Kurtz Introduction distribute copies of the registered copyrighted work.1 This article explores the methodology behind The Copyright Act further provides that anyone who obtaining electronic evidence of peer-to-peer users violates any of the exclusive rights of the copyright 2 and the use of that evidence in current copyright owner is an infringer of the copyright. infringement actions in United States Federal Courts. Pursuant to the Copyright Act, a plaintiff may elect Over the last year and a half, a number of lawsuits to recover statutory damages instead of actual have been filed on behalf of film copyright holders damages or the infringer’s profits. 17 U.S.C. § 504(c) seeking to enforce their rights against users of peer- provides: “the copyright owner may elect, at any time to-peer (P2P) torrent-type technologies used to before final judgment is rendered, to recover, instead unlawfully download and distribute films. of actual damages and profits, an award of statutory At the time of filing their complaints, the plaintiffs damages for all infringements involved in the action, have only been able to identify the Doe defendants by with respect to any one work ... in a sum of not less their internet Protocol (IP) address, the file hash, file than $750 or more than $30,000 as the court title, and the date and time of the alleged considers just.” Section 504(c) further provides that infringement. The only way that the plaintiffs can where an infringement is committed willfully, a court determine the defendants’ actual names is by has the discretion to increase the award of statutory 3 obtaining the information from the internet Service damages to $150,000.
    [Show full text]
  • Replication Strategies for Streaming Media
    “replication-strategies” — 2007/4/24 — 10:56 — page 1 — #1 Research Report No. 2007:03 Replication Strategies for Streaming Media David Erman Department of Telecommunication Systems, School of Engineering, Blekinge Institute of Technology, S–371 79 Karlskrona, Sweden “replication-strategies” — 2007/4/24 — 10:56 — page 2 — #2 °c 2007 by David Erman. All rights reserved. Blekinge Institute of Technology Research Report No. 2007:03 ISSN 1103-1581 Published 2007. Printed by Kaserntryckeriet AB. Karlskrona 2007, Sweden. This publication was typeset using LATEX. “replication-strategies” — 2007/4/24 — 10:56 — page i — #3 Abstract Large-scale, real-time multimedia distribution over the Internet has been the subject of research for a substantial amount of time. A large number of mechanisms, policies, methods and schemes have been proposed for media coding, scheduling and distribution. Internet Protocol (IP) multicast was expected to be the primary transport mechanism for this, though it was never deployed to the expected extent. Recent developments in overlay networks has reactualized the research on multicast, with the consequence that many of the previous mechanisms and schemes are being re-evaluated. This report provides a brief overview of several important techniques for media broad- casting and stream merging, as well as a discussion of traditional IP multicast and overlay multicast. Additionally, we present a proposal for a new distribution system, based on the broadcast and stream merging algorithms in the BitTorrent distribution and repli- cation system. “replication-strategies” — 2007/4/24 — 10:56 — page ii — #4 ii “replication-strategies” — 2007/4/24 — 10:56 — page iii — #5 CONTENTS Contents 1 Introduction 1 1.1 Motivation .
    [Show full text]
  • Defense Against the Dark Arts of Copyright Trolling Matthew As G
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2018 Defense Against the Dark Arts of Copyright Trolling Matthew aS g Jake Haskell Follow this and additional works at: https://lawecommons.luc.edu/facpubs Part of the Civil Procedure Commons, and the Intellectual Property Law Commons Defense Against the Dark Arts of Copyright Trolling Matthew Sag &Jake Haskell * ABSTRACT: In this Article, we offer both a legal and a pragmaticframework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half of all copyright casesfiled in the United States over the past threeyears. In the typical case, the plaintiffs claims of infringement rely on a poorly substantiatedform pleading and are targeted indiscriminately at noninfringers as well as infringers. This practice is a subset of the broaderproblem of opportunistic litigation, but it persists due to certain unique features of copyright law and the technical complexity of Internet technology. The plaintiffs bringing these cases target hundreds or thousands of defendants nationwide and seek quick settlements pricedjust low enough that it is less expensive for the defendant to pay rather than to defend the claim, regardless of the claim's merits. We report new empirical data on the continued growth of this form of copyright trolling in the United States. We also undertake a detailed analysis of the legal andfactual underpinnings of these cases. Despite theirunderlying weakness, plaintiffs have exploited information asymmetries, the high cost of federal court litigation, and the extravagant threat of statutory damages for copyright infringement to leverage settlementsfrom the guilty and the innocent alike.
    [Show full text]
  • Bittorrent Files Hace Stopped Downloading
    bittorrent files hace stopped downloading Why Some Torrents Don’t Download? A torrent that doesn’t start downloading or one that suddenly stops can be very frustrating. You check your Internet connection, the cables, and everything looks good. So what can be the reasons for those torrents that don’t seem to work? Some Torrents Don’t Download. The main reason behind a torrent file that doesn’t even start downloading is the lack of seeders and peers. In other words, there is no one seeding that file, meaning there’s no place where you can download it from. That’s why it’s very important that you have a look at the number of seeders and peers every time you start a new download. Seeders are the users who already finished downloading and are only sharing. The peers are the ones like you, the ones who are downloading and uploading at the same time. Some Files Suddenly Stop Downloading. This is another common scenario. We’ve all been there when a torrent stops at some moment, such as 99%. That usually happens when there are only peers, but no seeders . If you think about it, it makes total sense. The peers have many parts of the torrent in common, and they will share those between them. But because there are zero seeders, no one has the entire file , and everyone will share the same parts and stop in the same percentage point. A Dead Torrent. Both of the situations we just saw are what users in the community call a “dead torrent”.
    [Show full text]
  • Charter Spectrum Notice of Copyright Infringement
    Charter Spectrum Notice Of Copyright Infringement Davis educating his chauffeuse nichers thrasonically, but quartered Stanfield never pulverising so loose. Judicial and apprehensible Kenneth braised consumptively and clutch his abstention intractably and tracklessly. Yehudi often discuss spinally when unattainted Foster melodized past and braked her alps. There must be of charter communications operating credit for the transaction in a home where they do next and choose what cox Or abduct any product identification proprietary copyright or other. This website is vast service of Charter Communications Inc andor its respective subsidiaries providing the. While many users panic when receiving infringement notices from their ISP in the majority of cases there cause no need never worry Stopping sharing the lump in longevity usually solves the few and tie no additional sharing takes place to further warnings should be received for legitimate content are least. Alleging copyright infringement against an unnamed defendant Defendant1. And record labels who want over 10000 copyrights is fair clear message to ISPs like. Some policy forms an exclusion for trademark infringement. Recently changed commerce, infringement notice of charter spectrum copyright. Organization violated the Digital Millennium Copyright Act hurt when. Elizabeth Hart et al v Charter Communications Inc et al No. How tough my ISP tell below I'm downloading copyrighted files. Infringement claims continue to it brought frequently in the communications. Time Warner Subpoena Archives Torrent Lawsuit Defense. How to Pirate Software Without been Caught Gizmodo. Looking to a lawsuit attorneys fees logically flow as of infringement, net primarily include bandwidth being accused by them? For Android devices both clients work just got but the notable speed difference between BitTorrent and uTorrent in male former's favor gives it intelligent edge.
    [Show full text]
  • Improving Fairness in Peer-To-Peer Networks by Separating the Role of Seeders in Network Infrastructures
    Turkish Journal of Electrical Engineering & Computer Sciences Turk J Elec Eng & Comp Sci (2016) 24: 2255 { 2266 http://journals.tubitak.gov.tr/elektrik/ ⃝c TUB¨ ITAK_ Research Article doi:10.3906/elk-1402-304 Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures Alireza NAGHIZADEH∗, Reza EBRAHIMI ATANI Department of Computer Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran Received: 27.02.2014 • Accepted/Published Online: 08.07.2014 • Final Version: 15.04.2016 Abstract:Fairness is one of the most important challenges that should be considered as a priority when designing a P2P file-sharing network. An unfair P2P network may attract free-riders, frustrate the majority of users, and consequently shorten the longevity of files. When BitTorrent protocol was first introduced, by suggesting new algorithms like tit-for- tat or rarest-first and combining them with methods like choking and unchoking, it pushed fairness one step forward. However, BitTorrent did not bring a plenary solution and has its own shortcomings. For instance, neither this protocol nor other P2P protocols that we are aware of precisely indicate how seeders should be treated in their networks. Most of the time they dictate that seeders upload as much as possible. With this approach, seeders can easily be abused by free-riders. It gets even worse when we realize that for lack of a good infrastructure a lawful user may become a free-rider unknowingly. The purpose of this paper is to address this problem by suggesting a novel and universal method that can be implemented in current P2P networks.
    [Show full text]
  • Forcing the Net Through a Sieve: Why Copyright Filtering Is Not a Viable Solution for U.S
    Forcing the Net Through a Sieve: Why Copyright Filtering is Not a Viable Solution for U.S. ISPs Mehan Jayasuriya, Jef Pearlman, Robb Topolski, Michael Weinberg, Sherwin Siy www.PublicKnowledge.org i Acknowledgements The authors of this paper would like to thank the following advocates for their assistance and suggestions during the editing process: Public Knowledge president Gigi Sohn, Public Knowledge staff attorney Rashmi Rangnath, Public Knowledge legal consultant Adam Thomas, Public Knowledge intern Katy Tasker and Electronic Frontier Foundation staff technologist Peter Eckersley. ii Table of Contents Executive Summary ................................................................................................................. 1 1. Introduction...................................................................................................................... 2 2. Technological Analysis: The Anatomy of a Copyright Filter ............................................... 7 I. Determining Filter Policy ............................................................................................................................................. 8 A. Strict Policy Definition.....................................................................................................................................................8 B. Permissive Policy Definition..........................................................................................................................................9 II. Identifying Types of Content.....................................................................................................................................10
    [Show full text]
  • An Empirical Study of Seeders in Bittorrent
    An Empirical Study of Seeders in BitTorrent Justin Bieber, Michael Kenney, Nick Torre, and Landon P. Cox Duke University, Durham, NC Abstract a wide range of content to nearly 4 million users at any moment. BitTorrent has attracted attention from researchers As was the case in Izal's study, we collected data by and the press for its wide deployment and explicit goal passively monitoring BitTorrent use through the trackers of eliminating free-riding, but many of the most impor- that coordinate peers. This prevented us from directly tant peers in BitTorrent operate outside of its incentive observing how users respond to BitTorrent's incentive mechanisms. Altruistic seeders help bootstrap new peers mechanisms, but provided us with the number of seed- and provide a significant fraction of the global upload ers (peers who are uploading, but not downloading) and bandwidth. We have taken an empirical approach to un- leechers (peers who are downloading). derstanding seeders by studying 35 BitTorrent sites with Seeders are particularly important for bootstrapping nearly four million users at any moment over several new peers and to network performance. Many sites ex- weeks. plicitly encourage peers to continue uploading data even Our study focuses on two aspects of seeders. First, we after their download has finished. These reminders are looked at the relationship between the number of seeders necessary because seeding is altruistic rather than self- and bandwidth utilization. A case study of a Linux dis- interested; BitTorrent's incentive mechanisms cannot re- tribution network showed that as bandwidth utilization ward seeders for the upload bandwidth they contribute.
    [Show full text]
  • Peer-To-Peer File Sharing As User Rights Activism Michael A
    Western Journal of Legal Studies Volume 5 Article 3 Issue 3 State Encroachment on Personal Lives February 2015 Peer-to-Peer File Sharing as User Rights Activism Michael A. Gunn University of Western Ontario, [email protected] Follow this and additional works at: https://ir.lib.uwo.ca/uwojls Part of the Civil Law Commons, Civil Rights and Discrimination Commons, Common Law Commons, Communications Law Commons, Communication Technology and New Media Commons, Comparative and Foreign Law Commons, Computer Law Commons, Consumer Protection Law Commons, E-Commerce Commons, Economic History Commons, European Law Commons, Human Rights Law Commons, Intellectual Property Law Commons, International Law Commons, Internet Law Commons, Law and Economics Commons, Law and Philosophy Commons, Law and Society Commons, Legal History Commons, Science and Technology Law Commons, and the Science and Technology Policy Commons Recommended Citation Michael A. Gunn , "Peer-to-Peer File Sharing as User Rights Activism", (2015) 5:3 online: UWO J Leg Stud 3 <https://ir.lib.uwo.ca/ uwojls/vol5/iss3/3>. This Article is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Western Journal of Legal Studies by an authorized editor of Scholarship@Western. For more information, please contact [email protected], [email protected]. Peer-to-Peer File Sharing as User Rights Activism Abstract The pre-digital marketplace is no longer sustainable. With the imposition of digital rights management restrictions on the distribution of media, the Internet cannot promote intellectual freedom. Peer-to-peer file sharing technology helps expose the work of artists and authors to a much wider audience than previously possible.
    [Show full text]
  • P2P File Sharing P2P File Sharing
    P2P File Sharing P2P file sharing Alice chooses one of the peers, Bob. File is copied from Bob’s PC to Example Alice’s notebook: HTTP Alice runs P2P client While Alice downloads, other application on her notebook users uploading from Alice. computer Alice’s peer is both a Web client Intermittently connects to and a transient Web server. Internet; gets new IP address All peers are servers = highly for each connection scalable! Asks for “Hey Jude” Application displays other peers that have copy of Hey Jude. P2P: centralized directory (Napster’s Approach) Bob centralized directory server original “Napster” design 1 1) when peer connects, it peers 1 informs central server: IP address 1 3 content 2 1 2) Alice queries for “Hey Jude” 3) Alice requests file from Alice Bob P2P: problems with centralized directory file transfer is Single point of failure decentralized, but locating content is Performance highly decentralized bottleneck Copyright infringement Query flooding: Gnutella overlay network: graph edge between peer X fully distributed and Y if there’s a TCP no central server connection public domain all active peers and protocol edges is overlay net many Gnutella clients Edge is not a physical implementing protocol link Given peer will typically be connected with < 10 overlay neighbors Gnutella: protocol Ì File transfer: Query message HTTP sent over existing TCP connections Query Ì peers forward QueryHit Query message Ì QueryHit sent over reverse Query path QueryHit Scalability: limited scope flooding Gnutella: Peer joining 1. Joining peer X must find some other peer in Gnutella network: use list of candidate peers 2.
    [Show full text]
  • Compsci 514: Computer Networks Lecture 21-2: from Bittorrent to Bittyrant Problem Statement
    CompSci 514: Computer Networks Lecture 21-2: From BitTorrent to BitTyrant Problem Statement ... Server • One-to-many content distribution – Millions of clients downloading from the same server Evolving Solutions • Observation: duplicate copies of data are sent • Solutions – IP multicast – End system multicast – Content distribution networks e.g. Akamai – P2P cooperative content distribution • Bittorrent etc. IP multicast • End systems join a multicast group • Routers set up a multicast tree • Packets are duplicated and forwarded to multiple next hops at routers • Multicast pros and cons End system multicast • End systems rather than routers organize into a tree, forward and duplicate packets • Pros and cons Content distribution networks • Akamai – Works well but expensive, requires infrastructure support Peer-to-Peer Cooperative Content Distribution u Use the client’s uplink bandwidth u New problem: incentives for cooperation or how to motivate clients to upload The Gnutella approach u All nodes are true peers u A peer is the publisher, the uploader and the downloader. u No single point of failure. u Efficiency and scalability issue: u File searches span across a large number of nodes generating lots of traffic. u Integrity, i.e.content pollution issue: u Anyone can claim that he publishes valid content u No guarantee of quality of objects u Incentive issue: u No incentives for cooperation (free-riding in Gnutella) Outline u Problem of Content Distribution u The BitTorrent approach u BitTyrant BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g. 256KB) uShA1 hashes of all the pieces are included in the .torrent file for integrity check uA chunk is divided into sub-pieces to improve efficiency u Seeders have all chunks of the file u Leechers have some or no chunks of the file BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g.
    [Show full text]
  • Exploiting Bittorrent for Fun (But Not Profit)
    Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, and Lixia Zhang University of California, Los Angeles fnikitas, rlnelson, kohler, [email protected] ABSTRACT the file can be downloaded from different peers. A meta- This paper assesses BitTorrent’s robustness against selfish peers, data file is associated with every download. This file con- who try to download more than their fair share by abusing existing tains information necessary for the download process, in- protocol mechanisms. We design and implement three selfish-peer cluding the number of pieces and hashes for all the pieces; exploits and evaluate their effectiveness on public and private tor- the hashes are used by peers to verify that a piece has been rents. In practice, BitTorrent appears quite robust against this kind received correctly. This metadata file is typically created by of exploit: selfish peers can sometimes obtain more bandwidth, and the content provider, who must also launch at least one client honest peers’ download rates suffer slightly in consequence, but we offering the entire file for download. In order to join the observe no considerable degradation of the system’s quality of ser- download process, a client retrieves the metadata file out of vice. We identify private-torrent scenarios in which a selfish peer band, usually either from a well-known website or by email. could benefit more significantly at the expense of honest peers, and It then contacts the tracker, a centralized component that discuss the BitTorrent protocol mechanisms that lead to robustness by rendering these scenarios infeasible. keeps track of all the peers participating in the download.
    [Show full text]