Skip to main content

Finding δ-Closure Property of BitTorrent System and Applications Based on This Property

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3126 Accesses

Abstract

In the Peer-to-peer (P2P) field, a basic problem is to build a model which can exactly represent the behaviors of peers. According to the protocols of BitTorrent (BT) system, participating peers are selected randomly when downloading some content. However, by using the connection model gathered during a one-month period, we found that the BT peers are subject to the δ-closure property, which is that the content in one δ-closure tends to spread inside this δ-closure. In this paper, we defined δ-closureaccording to the complex network theory. Then we tried to design algorithm to attain δ-closure. By gathered dataset, we verified the existing of δ-closure in BT system. Finally, we proposed possible applications based on this property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Choffnes, D.R., Bustamante, F.E.: Taming the torrent: A practical approach to reducing cross-ISP traffic in peer-to-peer systems. In: Proc. of ACM SIGCOMM (August 2008)

    Google Scholar 

  2. Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: Proc. of the ACM (SOSP 2003), pp. 314–329 (2003)

    Google Scholar 

  3. Piatek, M., Isdal, T., Anderson, T., Krishanamurthy, A., Venkataramani, A.: Do incentives build robustness in bittorrent. In: Proc. of USENIX NSDI (April 2007)

    Google Scholar 

  4. Lee, U., Choi, M., Cho, J., Sanadidi, M.Y., Gerla, M.: Understanding Pollution Dynamics in P2P File Sharing. In: Proc. of IPTPS 2006 (February 2006)

    Google Scholar 

  5. Iosup, A., Garbacki, P., Pouwelse, J.A., Epema, D.H.J.: Analyzing BitTorrent: Three Lessons from One Peer-Level View, PeerLevel View. In: Proc. 11 th ASCI Conf.

    Google Scholar 

  6. Qiu, D., Srikant, R.: Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: ACM SIGCOMM Conference 2004, Portland, Oregon, USA, pp. 367–378 (2004)

    Google Scholar 

  7. Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., Zhang, X.: A performance study of BitTorrent-like peer-to-peer systems. IEEE Journal on Seclected Areas in Communications 25(1) (January 2007)

    Google Scholar 

  8. Arenas, A., Danon, L., Dfaz-Guilera, A., Gleiser, P.M., Guimera, R.: Community analysis in social networks. Eur: Phys. J. B 38, 373–380 (2004)

    Article  Google Scholar 

  9. Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  10. Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69(2), 026113 (2004)

    Article  Google Scholar 

  11. Blondel, V.D., Guillaume, J.L., Lambiotte, R., et al.: Fast unfolding of community hierarchies in large networks. Journal of Statistical Mechanics:Theory and Experiment 10, 10008 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kun, W., Ying, S., Jian-long, T., Li, G., yang, L. (2013). Finding δ-Closure Property of BitTorrent System and Applications Based on This Property. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics