Skip to main content

Overlay Connection Usage in BitTorrent Swarms

  • Conference paper
Incentives, Overlays, and Economic Traffic Control (ETM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6236))

Included in the following conference series:

  • 372 Accesses

Abstract

The amount of peer-to-peer (P2P) traffic and its inefficient utilization of network resources make it a high priority for traffic management. Due to the distributed nature of P2P overlays, a promising approach for a management scheme is to change the client behavior and its utilization of overlay connections. However, from the viewpoint of a client, there are different categories of overlay connections. In this paper, we discern between these different types of overlay connections in BitTorrent, the currently most popular P2P file-sharing application. A simulation study of BitTorrent and a video-streaming derivate called Tribler provides insights into the usage of these types of connections for data exchange. Thus, traffic management based on client behavior can be optimized by efficiently targeting connections which carry the most traffic. We also show the implications of these results for locality-awareness mechanisms such as Biased Neighbor Selection and Biased Unchoking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bindal, R., Cao, P., Chan, W., Medval, J., Suwala, G., Bates, T., Zhang, A.: Improving traffic locality in bittorrent via biased neighbor selection. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, p. 66. IEEE Computer Society, Washington (2006)

    Google Scholar 

  2. Bertsekas, D., Gallagher, R.: Data Networks. Prentice-Hall, Englewood Cliffs (1987)

    Google Scholar 

  3. Bharambe, A.R., Herley, C., Padmanabhan, V.N.: Analyzing and improving a bittorrent networks performance mechanisms. In: 25th IEEE International Conference on Computer Communications (INFOCOM 2006), pp. 1–12 (April 2006)

    Google Scholar 

  4. Bittorrent specification, http://wiki.theory.org/BitTorrentSpecification

  5. Inc. Cisco Systems. Cisco Visual Networking Index: Forecast and Methodology, 2008-2013. White Paper (June 2009)

    Google Scholar 

  6. Galuba, W., Aberer, K., Despotovic, Z., Kellerer, W.: ProtoPeer: A P2P Toolkit Bridging the Gap Between Simulation and Live Deployment. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009)

    Google Scholar 

  7. Gimenez, J.P.F.-P., Rodriguez, M.A.C., Hasan, H., Hoßfeld, T., Staehle, D., Despotovic, Z., Kellerer, W., Pussep, K., Papafili, I., Stamoulis, G.D., Stiller, B.: A new approach for managing traffic of overlay applications of the smoothIT project. In: Hausheer, D., Schönwälder, J. (eds.) AIMS 2008. LNCS, vol. 5127, Springer, Heidelberg (2008)

    Google Scholar 

  8. Hoßfeld, T., Hock, D., Oechsner, S., Lehrieder, F., Despotovic, Z., Kellerer, W., Michel, M.: Measurement of bittorrent swarms and their as topologies. Technical Report 463, University of Würzburg (November 2009)

    Google Scholar 

  9. Izal, M., Urvoy-Keller, G., Biersack, E.W., Felber, P.A., Al, Garcés-Erice, L.: Dissecting bittorrent: Five months in a torrent’s lifetim, pp. 1–11 (2004)

    Google Scholar 

  10. Legout, A., Urvoy-Keller, G., Michiardi, P.: Rarest first and choke algorithms are enough (2006)

    Google Scholar 

  11. Oechsner, S., Lehrieder, F., Hoßfeld, T., Metzger, F., Pussep, K., Staehle, D.: Pushing the performance of biased neighbor selection through biased unchoking. In: 9th International Conference on Peer-to-Peer Computing, Seattle, USA (September 2009)

    Google Scholar 

  12. Oechsner, S., Soursos, S., Papafili, I., Hoßfeld, T., Stamoulis, G.D., Stiller, B., Callejo, M.A., Staehle, D.: A Framework of Economic Traffic Management Employing Self-organization Overlay Mechanisms. In: Hummel, K.A., Sterbenz, J.P.G. (eds.) IWSOS 2008. LNCS, vol. 5343, pp. 84–96. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 205–216. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Pouwelse, J.A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D.H.J., Reinders, M., Van Steen, M.R., Sips, H.J.: Tribler: A social-based peer-to-peer system. In: The 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006), pp. 1–6 (2006)

    Google Scholar 

  15. Protopeer, http://protopeer.epfl.ch/index.html

  16. Qiu, D., Srikant, R.: Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: SIGCOMM 2004: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 367–378. ACM, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oechsner, S., Lehrieder, F., Staehle, D. (2010). Overlay Connection Usage in BitTorrent Swarms. In: Stiller, B., Hoßfeld, T., Stamoulis, G.D. (eds) Incentives, Overlays, and Economic Traffic Control. ETM 2010. Lecture Notes in Computer Science, vol 6236. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15485-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15485-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15484-3

  • Online ISBN: 978-3-642-15485-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics