skip to main content
10.1145/1177080.1177106acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Rarest first and choke algorithms are enough

Published:25 October 2006Publication History

ABSTRACT

The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rarest first and choke algorithms. Whereas it is commonly admitted that BitTorrent performs well, recent studies have proposed the replacement of the rarest first and choke algorithms in order to improve efficiency and fairness. In this paper, we use results from real experiments to advocate that the replacement of the rarest first and choke algorithms cannot be justified in the context of peer-to-peer file replication in the Internet.We instrumented a BitTorrent client and ran experiments on real torrents with different characteristics. Our experimental evaluation is peer oriented, instead of tracker oriented, which allows us to get detailed information on all exchanged messages and protocol events. We go beyond the mere observation of the good efficiency of both algorithms. We show that the rarest first algorithm guarantees close to ideal diversity of the pieces among peers. In particular, on our experiments, replacing the rarest first algorithm with source or network coding solutions cannot be justified. We also show that the choke algorithm in its latest version fosters reciprocation and is robust to free riders. In particular, the choke algorithm is fair and its replacement with a bit level tit-for-tat solution is not appropriate. Finally, we identify new areas of improvements for efficient peer-to-peer file replication protocols.

References

  1. http://www.slyck.com.Google ScholarGoogle Scholar
  2. http://www.bittorrent.com/.Google ScholarGoogle Scholar
  3. Bittorrent protocol specification v1.0. http://wiki.theory.org/BitTorrentSpecification, June 2005.Google ScholarGoogle Scholar
  4. R. Bhagwan, S. Savagen, and G. Voelker. Understanding availability. In International Workshop on Peer-to-Peer Systems, Berkeley, CA, USA, February 2003.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. R. Bharambe, C. Herley, and V. N. Padmanabhan. Analysing and improving bittorrent performance. In Proc. IEEE Infocom'2006, Barcelona, Spain, April 2006.Google ScholarGoogle ScholarCross RefCross Ref
  6. E. W. Biersack, P. Rodriguez, and P. Felber. Performance analysis of peer-to-peer networks for file distribution. In Proc. Fifth International Workshop on Quality of Future Internet Services (QofIS'04), Barcelona, Spain, September 2004.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Chawathe, S. Ratnasamy, L. Breslau, and S. Shenker. Making gnutella-like p2p systems scalable. In Proc. ACM SIGCOMM'03, Karlsruhe, Germany, August 25-29 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Cohen. Incentives build robustness in bittorrent. In Proc. First Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA, June 2003.Google ScholarGoogle Scholar
  9. P. Felber and E. W. Biersack. Self-scaling networks for content distribution. In Proc. International Workshop on Self-* Properties in Complex Information Systems, Bertinoro, Italy, May-June 2004.Google ScholarGoogle Scholar
  10. P. Ganesan and M. Seshadri. On cooperative content distribution and the price of barter. In IEEE ICDCS'05, Columbus, Ohio, USA, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Gkantsidis and P. Rodriguez. Network coding for large scale content distribution. In Proc. IEEE Infocom'2005, Miami, USA, March 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of dht routing geometry on resilience and proximity. In Proc. ACM SIGCOMM'03, Karlsruhe, Germany, August 25-29 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, analysis, and modeling of bittorrent-like systems. In Proc. ACM IMC'2005, Berkeley, CA, USA, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Izal, G. Urvoy-Keller, E. W. Biersack, P. Felber, A. A. Hamra, and L. Garcés-Erice. Dissecting bittorrent: Five months in a torrent's lifetime. In Proc. PAM'04, Antibes Juan-les-Pins, France, April 2004.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Jun and M. Ahamad. Incentives in bittorrent induce free riding. In Proc. SIGCOMM'05 Workshops, Philadelphia, PA, USA, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Karagiannis, A. Broido, N. Brownlee, and K. C. Claffy. Is p2p dying or just hiding? In Proc. IEEE Globecom'04, Dalla, Texas, USA, Nov. 29-Dec. 3 2004.Google ScholarGoogle ScholarCross RefCross Ref
  17. T. Karagiannis, A. Broido, M. Faloutsos, and K. C. Claffy. Transport layer identification of p2p traffic. In Proc. ACM IMC'04, Taormina, Sicily, Italy, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Kostić, R. Braud, C. Killian, E. Vandekieft, J. W. Anderson, A. C. Snoeren, and A. Vahdat. Maintaining high bandwidth under dynamic network conditions. In Proc. USENIX'05, Anaheim, CA, USA, April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Legout, G. Urvoy-Keller, and P. Michiardi. Rarest first and choke algorithms are enough. Technical Report (inria-00001111, version 3 - 6 September 2006), INRIA, Sophia Antipolis, September 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Parker. The true picture of peer-to-peer filesharing. http://www.cachelogic.com/, July 2004.Google ScholarGoogle Scholar
  21. J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips. The bittorrent p2p file-sharing system: Measurements and analysis. In Proc. 4th International Workshop on Peer-to-Peer Systems (IPTPS'05), Ithaca, New York, USA, February 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Qiu and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In Proc. ACM SIGCOMM'04, Portland, Oregon, USA, Aug. 30-Sept. 3 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proc. ACM SIGCOMM'01, San Diego, California, USA, August 27-31 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Rodriguez and E. W. Biersack. Dynamic parallel-access to replicated content in the internet. IEEEACM Transactions on Networking, 10(4), August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. ACM SIGCOMM'01, San Diego, California, USA, August 27-31 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. X. Yang and G. de Veciana. Service capacity in peer-to-peer networks. In Proc. IEEE Infocom'04, pages 1--11, Hong Kong, China, March 2004.Google ScholarGoogle Scholar

Index Terms

  1. Rarest first and choke algorithms are enough

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
          October 2006
          356 pages
          ISBN:1595935614
          DOI:10.1145/1177080

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 October 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate277of1,083submissions,26%

          Upcoming Conference

          IMC '24
          ACM Internet Measurement Conference
          November 4 - 6, 2024
          Madrid , AA , Spain

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader