skip to main content
10.1145/1544012.1544030acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Uplink allocation beyond choke/unchoke: or how to divide and conquer best

Published:09 December 2008Publication History

ABSTRACT

Motivated by emerging cooperative P2P applications we study new uplink allocation algorithms for substituting the rate-based choke/unchoke algorithm of BitTorrent which was developed for non-cooperative environments. Our goal is to shorten the download times by improving the uplink utilization of nodes. We develop a new family of uplink allocation algorithms which we call BitMax, to stress the fact that they allocate to each unchoked node the maximum rate it can sustain, instead of an 1/(k + 1) equal share as done in the existing BitTorrent. BitMax computes in each interval the number of nodes to be unchoked, and the corresponding allocations, and thus does not require any empirically preset parameters like k. We demonstrate experimentally that Bit-Max can reduce significantly the download times in a typical reference scenario involving mostly ADSL nodes. We also consider scenarios involving network bottlenecks caused by filtering of P2P traffic at ISP peering points and show that BitMax retains its gains also in these cases.

References

  1. E. Altman, D. Barman, B. Tuffin, and M. Vojnovic. Parallel tcp sockets: Simple model, throughput and validation. In Proc. of IEEE INFOCOM '06, Barcelona, Spain, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  2. Ashwin R. Bharambe, Cormac Herley, and Venkata N. Padmanabhan. Analyzing and improving a bittorrent networks performance mechanisms. In Proc. of IEEE INFOCOM '06, Barcelona, Spain, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala, T. Bates, and A. Zhang. Improving traffic locality in BitTorrent via biased neighbor selection. In Proc. of IEEE ICDCS '06, Lisbon, Portugal, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bram Cohen. Incentives build robustness in BitTorrent. In Proc. of First Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA, Jun 2003.Google ScholarGoogle Scholar
  5. Michal Feldman, Kevin Lai, Ion Stoica, and John Chuang. Robust incentive techniques for peer-to-peer networks. In Proc. of ACM EC '04, New York, NY, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Feller. An Introduction to Probability Theory and Its Applications. Wiley, New York, 1968.Google ScholarGoogle Scholar
  7. Christos Gkantsidis and Pablo Rodriguez. Network coding for large scale content distribution. In Proc. of IEEE INFOCOM '05, Miami, FL, USA, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  8. Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiaoning Ding, and Xiaodong Zhang. Measurements, analysis, and modeling of bittorrent-like systems. In Proc. of ACM IMC'05, Berkeley, CA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Al Hamra, A. Legout, and C. Barakat. Understanding the properties of the Bittorrent Overlay. Technical Report 00162088, version 1, Inria, July 2007.Google ScholarGoogle Scholar
  10. Nikolaos Laoutaris, Pablo Rodriguez, and Laurent Massoulie. ECHOS: edge capacity hosting overlays of nano data centers. ACM SIGCOMM Comput. Commun. Rev., 38(1): 51--54, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Arnaud Legout, Nikitas Liogkas, Eddie Kohler, and Lixia Zhang. Clustering and sharing incentives in bittorrent systems. In Proc. of ACM SIGMETRICS '07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Arnaud Legout, G. Urvoy-Keller, and P. Michiardi. Rarest first and choke algorithms are enough. In Proc. of ACM IMC '06, Rio de Janeriro, Brazil, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Laurent Massoulie and Milan Vojnovic. Coupon replication systems. In Proc. of ACM SIGMETRICS '05, pages 2--13, Banff, Alberta, Canada, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. BRITE: An Approach to Universal Topology Generation. In Proc. of MASCOTS '01, pages 346--354, Cincinnati, OH, Aug 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. J. D. Mol, J. A. Pouwelse, M. Meulpolder, D. H. J. Epema, and H. J. Sips. Give-to-get: An algorithm for P2P video-on-demand. In Proc. of SPIE/ACM MMCN '08, San Jose, California, Jan 2008.Google ScholarGoogle Scholar
  16. Christos H. Papadimitriou and Kenneth Steiglitz. Combinatorial optimization: Algorithms and complexity. New York, 1998. Dover Publications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. Do incentives build robustness in BitTorrent? In Proc. of NSDI'07, Cambridge, MA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips. The BitTorrent P2P file-sharing system: Measurements and analysis. In Proc. of IPTPS'05, Ithaca, NY, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dongyu Qiu and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In Proc. of ACM SIGCOMM '04, pages 367--378, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Slashdot. Comcast Hinders BitTorrent Traffic, Aug 2007.Google ScholarGoogle Scholar
  21. Weishuai Yang and Nael B. Abu-Ghazaleh. GPS: A general Peer-to-Peer simulator and its use for modeling BitTorrent. In in Proc. of MASCOTS'05, pages 425--434, Atlanta, GA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Uplink allocation beyond choke/unchoke: or how to divide and conquer best

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
              December 2008
              526 pages
              ISBN:9781605582108
              DOI:10.1145/1544012

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 9 December 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate198of789submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader