Graduate School and Research Center in Digital Sciences

On the impact of greedy strategies in BitTorrent networks : the case of BitTyrant

Carra, Damiano;Neglia, Giovanni;Michiardi, Pietro

P2P 2008, 8th IEEE International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany

The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt sic altruism of the original version of BitTorrent in order to maximize the benefit of participating to a torrent.  In this work we study BitTyrant, a recently proposed strategic client. BitTyrant tries to determine the exact amount of contribution necessary to maximize its download rate by dynamically adapting and shaping the upload rate allocated to its neighbors. We evaluate in detail the various mechanisms used by BitTyrant to identify their contribution to the performance of the client.  Our findings indicate that the performance gain is due to the increased number of connections established by a  BitTyrant client, rather than for its subtle uplink allocation  algorithm; surprisingly, BitTyrant reveals to be altruistic  and particularly efficient in disseminating the content, especially during the initial phase of the distribution process.  The apparent gain of a single BitTyrant client, however, disappears in the case of a widespread adoption: our results indicate a severe loss of efficiency that we analyzed in detail. In contrast, a widespread adoption of the latest version of the mainline BitTorrent client would provide increased benefit for all peers.

Document Doi Bibtex

Title:On the impact of greedy strategies in BitTorrent networks : the case of BitTyrant
Keywords:greedy algorithms, peer-to-peer computing
Type:Conference
Language:English
City:Aachen
Country:GERMANY
Date:
Department:Data Science
Eurecom ref:2695
Copyright: © 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Bibtex: @inproceedings{EURECOM+2695, doi = {http://dx.doi.org/10.1109/P2P.2008.45 }, year = {2008}, title = {{O}n the impact of greedy strategies in {B}it{T}orrent networks : the case of {B}it{T}yrant }, author = {{C}arra, {D}amiano and {N}eglia, {G}iovanni and {M}ichiardi, {P}ietro }, booktitle = {{P}2{P} 2008, 8th {IEEE} {I}nternational {C}onference on {P}eer-to-{P}eer {C}omputing, 8-11 {S}eptember 2008, {A}achen, {G}ermany}, address = {{A}achen, {GERMANY}}, month = {09}, url = {http://www.eurecom.fr/publication/2695} }
See also: