skip to main content
article

Modeling and performance analysis of BitTorrent-like peer-to-peer networks

Authors Info & Claims
Published:30 August 2004Publication History
Skip Abstract Section

Abstract

In this paper, we develop simple models to study the performance of BitTorrent, a second generation peer-to-peer (P2P) application. We first present a simple fluid model and study the scalability, performance and efficiency of such a file-sharing mechanism. We then consider the built-in incentive mechanism of BitTorrent and study its effect on network performance. We also provide numerical results based on both simulations and real traces obtained from the Internet.

References

  1. Entropia. http://www.entropia.com.Google ScholarGoogle Scholar
  2. Top applications (bytes) for subinterface: SD-NAP traffic, 2002. www.caida.org/analysis/workload/byapplication/sdnap.Google ScholarGoogle Scholar
  3. L. Arnold. Stochastic Differential Equations: Theory and Applications. John Wiley, New York, NY, 1974.Google ScholarGoogle Scholar
  4. D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, Englewood Cliffs, NJ, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Billingsley. Convergence of Probability Measures. Wiley, 1968.Google ScholarGoogle Scholar
  6. F. Clevenot and P. Nain. A Simple Fluid Model for the Analysis of the Squirrel Peer-to-Peer Caching System. In Proceedings of IEEE INFOCOM, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. F. Clevenot, P. Nain, and K. Ross. Stochastic Fluid Models for Cache Clusters. Technical Report 4815, INRIA, Sophia Antipolis, 2003. To appear in Performance Evaluation.Google ScholarGoogle Scholar
  8. B. Cohen. Incentives build robustness in bittorrent, May 2003. http://bitconjurer.org/BitTorrent/bittorrentecon.pdf.Google ScholarGoogle Scholar
  9. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), Chateau Lake Louise, Banff, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Das and R. Srikant. Diffusion approximations for a single node accessed by congestion-controlled sources. IEEE Transactions on Automatic Control, 45(10):1783--1799, October 1998.Google ScholarGoogle ScholarCross RefCross Ref
  11. G. de Veciana and X. Yang. Fairness, incentives and performance in peer-to-peer networks. In the Forty-first Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, Oct. 2003.Google ScholarGoogle Scholar
  12. S. N. Ethier and T. G. Kurtz. Markov Processes: Characterization and Convergence. Wiley, 1994.Google ScholarGoogle Scholar
  13. Z. Ge, D. R. Figueiredo, S. Jaiswal, J. Kurose, and D. Towsley. Modeling peer-peer file sharing systems. In Proceedings of IEEE INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  14. P. W. Glynn. On the Markov property of the $GI/G/\infty$ Gaussian limit. Advances in Applied Probability, 14:191--194, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Iyer, A. Rowstron, and P. Druschel. Squirrel: A decentralized peer-to-peer web cache. In Proceedings of ACM Symposium on Principles of Distributed Computing (PODC '02), Monterey, California, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Liberzon and A. Morse. Basic problems in stability and design of switched systems. IEEE Control Systems Magazine, pages 59--70, 1999.Google ScholarGoogle Scholar
  17. T. S. Eugene Ng, Y.-H. Chu, S. G. Rao, K. Sripanidkulchai, and Hui Zhang. Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-To-Peer Systems. In Proceedings of IEEE INFOCOM, 2003.Google ScholarGoogle Scholar
  18. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content addressable network. In Proceedings of ACM SIGCOMM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. Technical report, University of Chicago, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 6(1), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishman. Chord: A scalable peer-to-peer lookup protocol for internet applications. In Proceedings of ACM SIGCOMM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Whitt. On the heavy-traffic limit theorems for GI/G/∞ queues. Advances in Applied Probability, 14:171--190, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  23. W. Whitt. Stochastic Process Limits. Springer, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  24. X. Yang and G. de Veciana. Service Capacity of Peer to Peer Networks. In Proceedings of IEEE INFOCOM, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Modeling and performance analysis of BitTorrent-like peer-to-peer networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 34, Issue 4
        October 2004
        385 pages
        ISSN:0146-4833
        DOI:10.1145/1030194
        Issue’s Table of Contents
        • cover image ACM Conferences
          SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
          August 2004
          402 pages
          ISBN:1581138628
          DOI:10.1145/1015467

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 August 2004

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader