Abstract
Peer-to-peer (P2P) sharing systems use incentives for resource exchange to encourage cooperation and ensure fairness. In bilateral strategies, such as BitTorrent Tit-for-Tat or deficit-based FairTorrent, individual decisions of peers utilize direct observations. It may result in low performance and unfair treatment. In this paper, we study a novel exchange strategy that applies Cyclic Ranking (CR). In addition to direct observations, a peer utilizes provision cycles—a shared history of effective exchanges. The PageRank algorithm runs for the locally collected cycles and computes the numerical ranks to estimate the reputation. The CR strategy incrementally augments known incentive-aware strategies. For evaluation we implement CR-BitTorrent and CR-FairTorrent variants. Our simulation model captures the dependence on network bandwidth and the number of seeders as well as selfishness and stability of the participants. The initial experiments show improved fairness and download times, compared to the original BitTorrent and FairTorrent. The performance of selfish and unstable peers decreases by as much as 50%. The CR strategy suits well in environments where direct reciprocity has shown little effect. Contrasted to existing solutions, the CR strategy rewards longevity and stability of peers.
1 Introduction
Single-resource exchange is a base component of P2P file-sharing networks. BitTorrent [1] and the multitude of its variants form one of the most demanded P2P protocol families [2]. Exchange in a BT-like system is based on bilateral incentives [3]: file downloading is possible in return for uploading to the same peer. A rational peer individually estimates reputation of other peers using direct observations of their provision. It is an approximated Tit-for-Tat strategy [1, 4]: each peer ranks its neighbors according to their direct provision. The BT strategy still suffers a certain level of unfairness and non-optimal performance. Although peers contribute upload bandwidth, there can be no appropriate return in the download performance.
Cyclic Ranking (CR) method [5] extends the direct observations with shared history in form of provision cycles. Research [3, 6,7,8] showed that such exchange paths do appear in P2P exchange due to its multilateral nature. Moreover, P2P reputation systems benefit from the use of structural ranking algorithms, such as EigenTrust [9] and Distributed PageRank [10], where connectivity properties of the network exchange influence the peer reputation.
This paper studies the applicability of the CR method for constructing effective incentives in BT-like systems. We contribute a novel CR strategy that provides multilateral incentives for cooperation. In addition to direct observation of its neighbors, any peer can maintain locally a directed graph consisting of provision cycles. They are constructed by recommendations coming from reputable neighbors, hence reflecting effective exchange chains in the network. Links of the graph are weighted with local reputation of recommenders. The distributed construction allows the peers to disseminate their local reputation through the network. The peers run a variant of the PageRank algorithm on this graph, evaluating in the numerical ranks the reputation that captures exchange connectivity properties as well as direct observations.
The CR strategy has following properties:
-
1)
CR can be implemented as an extension of a known BT-like strategy and incrementally deployed.
-
2)
Provision cycles can be constructed individually for any peer by collective work where the participation has incentives and requires relatively small effort from every good participant.
-
3)
CR ranks of peers provide proper incentives for cooperation, penalizing selfish and unstable peers and rewarding longevity and stability of peers.
-
4)
CR ranks are resilient to false reports and collusion.
We implement several CR variants for extending the known strategies—BitTorrent and FairTorrent. For the evaluation we use an OMNeT-based simulator. We also observed that the performance of BitTorrent and FairTorrent depends on algorithmic implementation. Thus, one contribution of the paper is a detailed description of BitTorrent algorithms missing in related work.
The rest of the paper is organized as follows. Section 2 introduces background on P2P single-resource exchange with bilateral incentives. Section 3 contributes the CR strategy and explains its support of multilateral incentives. In Section 4, we specify the algorithms of several BitTorrent versions. Section 5 presents our simulation experiments and initial findings. Section 6 concludes the paper.
2 Single-resource exchange
File-sharing in BitTorrent (BT) [1] and in its numerous variants applies single-resource (single-torrent) peer-assisted exchange. The resource is the peer upload bandwidth in exchange of file pieces [3]. For a given file, BT exchange is based on a swarm of N = N S + N L peers: N S seeders are file owners providing file pieces to others “for free” and N L leechers are interested in downloading the file. During the exchange, if a leecher u has downloaded some file pieces then u can upload them to other leechers. For absent pieces, u requests other peers of the swarm. Eventually, every leecher completes the file download.
The demand of every leecher is matched with available supply at other peers. They are motivated to contribute the bandwidth in a bilateral manner: download is possible in return for upload to the same peer. The objective is reducing the download performance for free-riders and other “parasite” participants. The fairness is supported on the microscopic view [11]: u uploads to v similarly to u has downloaded from v, based on u’s local estimations for v, for all leechers u and v. An individual algorithm a leecher uses in BT exchange is called a client. There are many implementations for practical use (e.g., Vuze (Azureus), μ Torrent) and for research (e.g., FairTorrent, PropShape, BitThief, BitTyrant).
A client divides runtime onto rounds, which are not synchronized among peers. Typical BT clients use 10–20 s rounds. FairTorrent [12] applies “more instant” strategy where every upload action (sending a data block) starts the next round. The similarity of upload and download is estimated locally using direct observations from several last rounds.
Each u tries to maintain n u connections (TCP) with other peers in the swarm (e.g., n u = 50 in Vuze, n u = 80 in original BT). Local routing table T u stores all open connections (n u = |T u |). It represents the neighborhood that u knows. The control traffic required for data exchange is minimal: each peer transmits messages indicating the data blocks it currently possess and messages signaling their interest in the blocks of other peers.
A leecher u selects n bst neighbors v of the highest download rates a v (v’s provision history). Besides, u selects n uch peers for optimistic unchoking. It aims at finding new neighbors in the swarm that would offer good download bandwidth. The original BT client unchokes peers randomly. Some popular BT client implementations (e.g., Azureus), on the other hand, make a weighted random choice that takes into account the exchange history with a peer.
The n bst + n uch neighbors are active, and u uploads only to them during the current round. For downloading u may exploit all peers and consume as much as possible from them.
The above strategy is described in terms of ranks. Completing round t, a peer u computes ranks r v (t + 1) that numerically estimate the observed v’s provision. In round t + 1, provision of u to v depends on the rank-based arrangement of neighbors. Table 1 shows ranks for BitTorrent (BT), PropShare (PS), and FairTorrent (FT). For new joining peers the direct rank is zero or can be set to a fixed small value.
The reference BT client with equal ranks for the top downloaders (active set) is not used in recent implementations.
The original BT strategy suffers from a certain level of unfairness [12]. Although peers contribute upload bandwidth, there can be no appropriate return in the download performance. One of the reasons is optimistic unchoking. Even making n uch = 1 does not properly restrain selfish strategies of other peers (e.g., BitTyrant) [13]. Another reason is the scarce granularity of contributing neighbors: small n bst (typically, n bst = 4) and treating all active neighbors equally in uploading. The PS strategy attempts to solve this issue by considering all possible neighbors (up to N) and splitting the peer’s upload bandwidth in proportion to the contribution received in the previous rounds.
Peer behavior is subject to frequent changes, random or strategic. The long-round strategies of BT and PS have slow reaction (typical round is 30 s). Selfish peers can earn points in t and become free-riders in t + 1. In contrast, the FT strategy does not fix round length: u changes v’s rank (deficit counter) whenever observing any download/upload activity of v. Thus, u reacts immediately to changes in v’s behavior. On the other hand, changes can be occasional, e.g., due to intermittent network connectivity. The FT strategy is short-term, not focusing on longevity and stability of the participation.
3 Cyclic ranking
Bilateral incentives are less efficient than multilateral [3, 14]. Direct observations provide small coverage, so discovery of good participants is slow. If peers share their observations, then a peer can locally approximate the global exchange activity for better reputation estimation. We apply the cyclic ranking (CR) ranking method of [5, Ch. 10] and develop a CR strategy for improving fairness and performance in BT-like systems.
A BT swarm is an almost full-connected network—each peer knows most of others. Considering only active upload links for each peer u, the instant exchange topology is a directed graph. A link u → v has weight c u v , e.g., deficit counter or download/upload ratio. Given this global graph, a ranking algorithm [15] computes ranks estimating the reputation of peers. The computation is either 1) centralized—a non-scalable solution for P2P, 2) distributed [10]—vulnerable to false reports, or 3) local—the global knowledge assumption is unrealistic [5].
3.1 Provision cycles
Let G = (N,L) be a directed graph that describes the global exchange topology. It has no parallel links and self-loops.
A provision cycle is an exchange chain in the swarm,
Every link w i → w i+1 is “good” in the bilateral exchange, i.e., w i+1 is a stable productive neighbor of w i . Cycles Eq. 1 exist in P2P economies [6, 7, 16]; they are short and have reasonable interpretation.
A BT-like strategy uses 2-hop cycles u → v → u, which are easily identifiable by direct observations.
3.2 Subjective cyclic graph
Let a node u create its own current local view of the exchange topology, as in the BarterCast reputation mechanism [17]. DenoteFootnote 1 G u = (N u ,L u ;C) the weighted u’s subjective graph, which is a personalized and partial view of G. In accordance with the basic CR method [5, Ch. 10], G u consists of provision cycles Eq. 1. Further let us call G u the u’s cyclic graph.
Consider how u can update its cyclic graph G u based on new cycles coming as recommendations from neighbors. Let v recommend m v cycles
where w j l ≠u for l = 1,…,l j . Denote w j0 = u and \({w_{j,l_{j}+1}=v}\).
3.2.1 Topology update
Construct 1 + m v cycles
The idea is illustrated in Fig. 1. The first cycle in Eq. 3 is the default 2-hop cycle. Peers w j l expand the u’s local knowledge. (Though some of them can be already in N u .)
Update Eq. 3 can be applied even if m v = 0 (no recommendation from v). All cycles
form the minimal cyclic graph that u can construct. Graph Eq. 4 can be used for the initialization.
A cycle in Eq. 2 reflects a good provision chain observable in the exchange topology (Fig. 1a). Update Eq. 3 introduces new good provision cycles to the u-aware multilateral exchange, and u becomes their head (Fig. 1b).
3.2.2 Reputation-aware link weights
Any indirect information from v is reputed by u in respect to v’s provision. The local direct rank r v provides the reputation bounds (see Table 1).
Update Eq. 3 defines 1 + m v cyclic flows, where v → u is the only common link. Let this u-incoming link have weight r v . All the m v + 1 outgoing links and their succeeding links are of uniform weights r v /(1 + m v ). This way is similar to flow-based reputation schemes, and leads to the circulation flow of r v units started from u.
Algorithm 1 formulates our cyclic graph construction. Any leecher u can perform it individually. The construction is personalized: u can make own decision on how to combine previous (rounds 1,2,…,t − 1) and recent (round t) observations.

On Step 1 the leecher u inherits selectively cycles found previously (G u (0) is empty). The selection problem is beyond the focus of this paper. In our experiments, u initializes \(\mathcal {C}_{u}(t)=\varnothing \).
The loop for v ∈ N u (t) considers possible cycles coming from the neighbors.
Step 3 evaluates initial node ranks r v (t) using direct local ranks \(r_{v}^{*}\) (see Table 1) and exponential moving average with degree 0 ≤ α r < 1. It makes a tradeoff between previous and recent behavior.Footnote 2 If α r = 0 then the initial rank and direct rank coincide, i.e., the case of BT-like algorithm. If α r > 0 then rounds of low provision reduce r v (t), even despite of high recent provision in t. Similarly, a new neighbor v can achieve high r v (t) if v was a good provider for u in few latest rounds τ < t. In our simulation experiments, α r = 0.5.
On Step 4, all default 2-hop cycles are addedFootnote 3. Then the link weights are updated with the initial v’s rank on Step 5. They can be changed on further iteration of the cycle (Steps 2–14) due to recommendations from other neighbors.
Step 6 restricts the consideration of u to its best neighbors, e.g., \(r_{v}\geq \bar {r}\) for a reasonable threshold \(\bar r\). Only good providers can recommend cycles to u and make u generous for the peers that feed v. In the basic case, v recommends its best neighbors w, resulting in 3-hop cycles u → w → v → u at u. In our experiments we consider a simple case when any leecher v recommends all cycles it knows. Steps 7–12 implement the topology and link weight update in G u based on incoming recommendations.
Importantly that v must donate some of its rank r v to the link weight for other nodes in G u . Thus u will upload more to those peers (link weight increment on Step 10). The sum weight increment to all m v links u → w j1 equals r v (t)m v /(1 + m v ), which is subtracted from the weight of u → v on Step 12. Although this donation reduces the direct upload from u to v, the latter expects provision benefit from the recommended peers. Moreover, v-incoming links can achieve additional weight due to recommendation from other u’s neighbors if v has showed its good provision for them. Taking into account all v ∈ N v , the link weight is made high if 1) many neighbors v recommend it, 2) recommenders are good (high r v ), 3) recommenders provide a moderate set of cycles (low m v ).
3.3 Cyclic PageRank
Cyclic graph G u represents knowledge on the u-aware exchange topology. The graph can be used for personalized local ranking (in respect to u) using known graph-based (structural) algorithms such as PageRank [15, 18].
PageRank was introduced for ranking web pages. A link from a page to another is an endorsement indicating the quality of the latter page. The background model is a random walk with probability of step u → v relative to link weight c v w :
forming the relative weight matrix \(\bar {C}\). At each step a node v selects with probability \(\bar c_{vw}\) a link v → w to follow. Assuming the steady state exists, the PageRank value p v is the probability that the random walk is in v. The computation is iterative:Footnote 4
starting from initial values \(p_{v}^{(0)}\) and converging to p v .
Similarly to web pages, a link v → w in G u is considered as indication of the quality of w for v. The idea was previously exploited in distributed PageRank [10] and EigenTrust [9], where c v w estimates u’s trust for v → w. In contrast, Cyclic PageRank is not based on the global exchange topology graph. The global graph assumption can be inadequate for unique link weighting: the same link v → w can easily appear good in respect to u 1 and bad in respect to u 2. That is, a rational u is interested in personalized knowledge (G u ).
For given G u let us further call p v the cyclic rank values (CR values), which are a non-negative real solution to
normalized with \({\sum }_{v\in N_{u}} p_{v} = 1\). Since G u is always strongly connected, no damping factor is needed for ensuring the steady state existence and convergence in Eq. 5. Rank p v becomes high when v appears in many cycles (many w → v) with high link weights (\(\bar c_{wv}\)) and high-rank predecessors (p w ).
3.4 Analysis
Let us prove that in case of no recommendations Algorithm 1 provides such ranks that coincide with direct ranks r v .
Theorem 1
For minimal cyclic graph G u the equality p v = r v holds.
Proof
Any minimal cyclic graph is defined by Eq. 4 for a given weight matrix C. The probability of being in some v ∈ T u during random walking in G u is simply determined with the normalized solution to Eq. 6:
Any weight c u v is initially equal to the local direct rank (see Table 1), and p v coincides with the normalized r v . □
A rational peer v is interested in that many peers recommend it in their cycles. Such recommendations propagate and increase the rank p v at v’s neighbors. This intuition substantiates the incentives for peers to share cycles.
By Algorithm 1, a neighbor v always becomes the last node in the cycles. This property reduces p v if v’s cycles consist of bad providers, so sacrificing v itself in the case of false reporting. Attempts for recommending many cycles (possibly consisting of sibling peers) lead to low link weights, since the direct provision/consumption ratio r v is partitioned among all cycles from v. Consequently, v is interested to recommend a moderate set of good cycles.
3.5 CR-extended BT-like exchange
There are different options of integrating CR into BT exchange, depending on how cycles are accumulated and how much they can affect the behavior of peers. By leveraging shared history in BT-like systems, the peers make more long-sighted decisions, possibly at the expense of immediate rewards. We explore different options by evaluating two strategies: CR-BT and CR-FT.
CR-BT represents a conservative approach, utilizing CR in a very unobtrusive manner. It extends the vanilla BitTorrent algorithm by modifying only two choices made by peers (which are normally given less attention to): optimistic unchoking and peer selection.
BT optimistic unchoking aims at discovering better peers by choosing n uch random peers to unchoke at every round. CR-BT modifies this stochastic mechanism using the probability distribution relative to the peer CR ranks. The probability of v being unchoked by u becomes
Note that Eq. 7 cannot use the local ranks r v from Table 1, since r v are available for active peers only. In contrast, cyclic graph \(\mathcal {C}_{u}\) contains peers that are observed directly or from (indirect) recommendations of good neighbors.
In BT selection, u chooses in the whole swarm a few peers to which an active connection is maintained. The CR-BT strategy selects the peers based on their CR ranks p v . This bolsters the effect of the CR-BT unchoke, as the peers connecting to u are also more likely to esteem u (in terms of CR), and thus unchoke.
CR-FT is an extension of FairTorrent, capturing its ultra reactive chokeless model. An FT peer chooses the next packet to transmit based on the instant deficits (local ranks r v ) of its neighbors. A CR-FT peer prioritizes the CR ranking p v over the deficit and chooses v ∗ of the highest CR rank among all peers that u knows:
The CR-FT strategy relies therefore on the shared history (if u accumulated it already), rewarding peers that have contributed to the network as a whole, not only recently to u (its current neighbors).
4 Algorithms / methodology
The purpose of the simulations is to discover the behavior of the proposed schemes compared to existing ones, and asses their benefits and suitability for different scenarios. Specifically, we look at the base performance of the different algorithms in terms of completion times for individual peers in order to see how the algorithms change the incentives for peers to behave in different ways.
4.1 Simulator description
We observed that behavior of different BitTorrent versions depends a lot on the details of algorithms for peer selection and bandwidth allocation which are often hidden in the implementation details. Therefore, we see it as an important contribution to list all key algorithms explicitly to facilitate reproductivity of experiments and comparison with future BitTorrent enhancements.
We implemented those algorithms using an OMNeT++ simulator framework-based BIT-SIM simulator. The BT swarm simulator consists of a Tracker and a group of peers. The peers were assigned one of the following roles according to each simulator’s parameters which are described below: a seeder, leecher, selfish or unstable.
All connections between peers and the tracker are constructed using identical bandwidth-limited data links, creating a homogeneous network. To enforce a strict total uplink bandwidth limit independently of the number of peer connections, the simulator uses a queuing system for packet transmission; each peer would transmit using only a single data link at a time, ensuring that the total uplink bandwidth equals that of the individual links.
The data processing events were completed without artificially introduced delay (all processing is instantaneous in the simulation’s timeframe).
4.2 Client behavior
The BitTorrent clients’ behavior can be divided into the following phases: 1) a periodic timer, 2) when receiving data, 3) when transmitting data, 4) when receiving a new peer connection.
All BT leecher peers’ timers follow the following pattern. During initialization, each peer would be assigned a unique identifier and register with the tracker. After that, and every 30 minutes, peers would request a list p p o t of 100 active peers from the tracker, which is constructed by randomly selecting peers from all known to the tracker p a l l (Algorithm 2). After acquiring p p o t , and every 5 minutes, peers would discard peers already connected, creating a list of potential new peers p n e w . From this list, peers would be selected using the function S e l e c t P e e r(), and a connection would be attempted to be established until the total number of peer connections is 50 or p n e w is empty.

In BT and FT, the S e l e c t P e e r() will uniformly select a random peer. In CR-BT and CR-FT, the peer will be randomly selected using its cyclic rank value as weight (Algorithm 3).

Selecting which data requests to respond to is done either through choking (ignoring requests) or recipient selection. FT and CR-FT does not use choking, instead they accept all requests, but respond to these selectively. BT and CR-BT use choking, but respond to all requests they accept. In order to select which peers to unchoke, or the next request to respond to, both the number of bytes received and transmitted is recorded for each peer.
Selection of the peers to unchoke in BT and CR-BT is done every 10 seconds (Algorithm 4). BT uses the peers’ performance (bytes received from the peer) during the last 10 seconds as criteria, while CR-BT uses the peers’ ranks. Each round, four peers are unchoked, with a fifth chosen randomly (BT) or based on the ranks (CR-BT) each 30 seconds (using S e l e c t P e e r() defined earlier).

In contrast, FT and CR-FT unchoke all peers that express interest. In BT and CR-BT, requests are responded to in the order they arrive.
The FT algorithm uses the total deficit for each peer, i.e., the difference between the number of bytes sent and received over the lifespan of the connection, to select the next request to respond to (Algorithm 5). The first request from the peer with the lowest deficit is chosen.

CR-FT chooses the first request by the peer with the highest rank value (Algorithm 6).

4.3 Malicious- and misbehaving nodes
The selfish nodes operate identically to normal leechers of the selected algorithm (including connection establishment, when requesting pieces, the choke mechanism), except when receiving a piece request from a peer. The requests are simply discarded without informing the requestor.
Unstable nodes also operate identically to normal leechers, but initiate periods when no packets (of any kind) are sent or received, simulating a client who either logs off unexpectedly for some time, or has a bad network connection (Algorithms 7). The packets, which include piece requests, data blocks and control packets, are discarded completely during the periods of instability. The instability is triggered by a timer which is set to fire after a time \(\mathcal {Ts} = uniform(\mathcal {Ts}_{min}, \mathcal {Ts}_{max})\), following the last period of instability. The instability lasts for a time \(\mathcal {Tu} = uniform(\mathcal {Tu}_{min}, \mathcal {Tu}_{max})\).

After the simulation, the completion times for unstable nodes are calculated using only the periods of stability. This provides us with comparative values that highlight only the effect of the unstable behavior.
4.4 Round-robin seeder
Seeders use the choking mechanism, as BT and CR-BT, to select which peers are provided data. Up to 4 peers are unchoked each 10 seconds in a round-robin manner (Algorithm 8).

5 Simulation
We evaluated the CR strategies using a simulator developed with the OMNeT++ tool [19]. Different set-ups allow comparing the performance to regular BT and FT strategies when the proportions of different types of peers are varied. We also simulated mixed-strategy networks in order to determine the benefits in gradual deployment.
5.1 Model
The model focuses on evolution of an N-size swarm. Given a swarm, its primary client strategy is fixed. The file size is F. Let all peers be classified into types i = 0,1,…,n, where type i = 0 represents seeders and types i > 0 represent leechers of different behavior. The type ordering is partial in terms of the selfishness level, i.e., for some i < j we cannot assert that type j is more selfish than i.
The basic set of types for our experiments is shown in Table 2 (n = 5). It can be easily extended, e.g., BitTyrant client [13] allows benefit (if possible) by deviating strategically from the strict bilateral balance.
Let N i be the number of peers of type i in the swarm, \(N={\sum }_{i=0}^{n} N_{i}\). At the start of any simulation the population size parameters N and \((N_{i})_{i=0}^{n}\) are fixed. Among N peers the n types are assigned at random.
Throughout the simulation, the parameters remain constant. Any seeder stays in the swarm forever. After completing a download, the leecher is replaced by a new peer of the same type. Therefore the model reflects a stable regime of exchange, and we focus on evolutionary long-term characteristics of fairness and performance.
The basic performance metrics are summarized in Table 3. Clearly B i = L i /T i . Applying Little’s law, we yield N i = λ i T i , where λ i is the departure rateFootnote 5
of leechers of type i. Contrasting L i to F estimates the fairness.
The model supports sequential event-driven sampling. An event is a departure of next leecher u due to download completion. If u is of type i then the next sample for every metric (T i (u), L i (u), and B i (u)) is calculated.
Comparison of swarms with different primary strategies evaluates improvements in the fairness and performance. Intuitively, an efficient strategy makes 1) T low for good leechers and higher for leechers with more selfish behavior, 2) L comparable with or less than F for good leechers.
5.2 Experiments
Our BitTorrent simulator is based on the work described in [21]. The implementation was ported to OMNeT++ 4.2.2, adding additional logging capabilities, configurable peer and seeder behavior, and the latest versions of BT algorithms (including FairTorrent).
The experiments consist of more than 600 individual simulations, each implements a swarm for sharing a 650MB torrent file.
Each simulation was run five times, with different role assignments, using a homogeneous network (bandwidth and peer capabilities). The bandwidth of each peer was limited only on outgoing (provisioning) traffic, and had a set delay of 300ms.
The cycle distribution for the CR strategies is implemented using custom BitTorrent extension packets. The cycles (and ranks) were updated periodically every 60 seconds, with the cycle length limited to 5 nodes.
5.3 Analysis
We measured the base performance of the CR strategy in networks without selfish or unstable peers. Figure 2 shows that both CR-BT and CR-FT perform as well or better than their counterparts with regards to the average download completion time for leechers. The improvement is roughly 10% between BT and CR-BT throughout the simulations. The impact of CR-FT was more diverse, showing 10..24% shorter times in restricted networks (low bandwidth and N seeder), while performing as well as normal FT in others. On the other hand, the CR strategies increase the variation.
Our simulations showed that CR decreases the average download time for good leechers by 2.6% (Fig. 3) when there are selfish peers. Nevertheless, CR has no substantial impact on discouraging specifically selfish behavior compared to FT, as the slightly shorter completion times can be attributed to the general swarm efficiency improvement seen earlier. Compared to BT, the CR strategy does show noticeable improvement, increasing the completion times for selfish peers by 15..32%.
The most interesting results were observed when introducing unstable peers. This had little effect on the performance of BT, CR-BT and FT; the figures for unstable peers were indistinguishable from good peers (when subtracting the periods of inactivity). In contrast, CR-FT shows very strong reaction, especially in low-bandwidth networks (Fig. 4). The completion time for unstable peers increases by 32% on average, in some cases by as much as 50%. Stable peers experience shorter times as the share of unstable peers is increasing.
The increase for unstable peers is explained by the CR ranks. They decrease during inactivity, leaving the peers less likely of being served. The stable peers having stable ranks naturally benefit from this drop. As the number of unstable peers increases, the number of better ranked peers competing for the same resource decreases, leading to better service.
Finally, we experimented with mixed swarms consisting of leechers following both BT and the CR strategies. Overall, in a network with only good leechers, the completion times remained stable even though the share of CR-nodes varied (Fig. 5a). This suggests that the CR strategy (especially CR-FT) is beneficial even when sparsely deployed. However, in the presence of unstable nodes (Fig. 5b), the performance of CR-FT peers depends on the number of leechers implementing the strategy. The completion times for CR-FT leechers increase as the share of them decreases, suggesting that a wide deployment is required to efficiently discourage unstable behavior.
6 Conclusion
Bilateral single-resource exchange in P2P sharing systems, which is based on direct observations, can be effectively extended with additional indirect information that comes from multilateral exchanges. This information is represented by provision cycles, which naturally exist in such systems as previous studies showed. We applied the Cyclic Ranking method and proposed an advanced peer strategy (CR strategy) for BitTorrent-like systems. The CR strategy can be implemented there as an extension allowing incremental deployment. These properties are confirmed by implementation for BitTorrent and FairTorrent.
Our initial experiments showed that rational peers have certain incentives for using the CR strategy. In a network with selfish peers, CR slightly reduces the average download time for good leechers and significantly punishes selfish peers. In presence of unstable peers, CR is the only strategy that punishes the instability and encourages the stability. The overhead of cycle collection was estimated at few percent of bandwidth, thus not affecting the download rate noticeably. The limitations of our work include a simple churn model using the unstable peers and homogeneous network topology. In future work, we plan to extend the model to include multiple swarms per a single client.
Notes
For the simplicity the notation does not show the dependence of C on u.
If no previous ranking is available for v then let r v (t − 1) = 0.
By default, c v w = 0 for any new link v → w added to G u .
As we shall see later, Cyclic PageRank does not require a damping factor.
The departure and arrival rates are equal since N i is fixed.
References
Cohen B (2003) Incentives build robustness in bittorrent. In: Proceedings of the 1st workshop on economics of peer-to-peer systems
Dhungel P, Wu D, Ross KW (2009) Measurement and mitigation of BitTorrent leecher attacks. Comput Commun 32(17):1852–1861. [Online]. Available. doi:10.1016/j.comcom.2009.07.006
Aperjis C, Freedman MJ, Johari R (2011) Bilateral and multilateral exchanges for peer-assisted content distribution. IEEE/ACM Trans Netw 19:1290–1303
Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) BitTorrent Is an auction: analyzing and improving BitTorrent’s incentives. SIGCOMM Comput Commun Rev 38:243–254
Korzun D, Gurtov A (2013) Structured peer-to-peer systems: fundamentals of hierarchical organization, routing, scaling and security. Springer
Anagnostakis KG, Greenwald MB (2004) Exchange-based incentive mechanisms for peer-to-peer file sharing. In: Proceedings of the 24th international conference on distributed computing systems (ICDCS’04), ser. ICDCS ’04. IEEE Computer Society, pp 524–533
Menasché DS, Massoulié L, Towsley D (2010) Reciprocity and barter in peer-to-peer systems. In: Proceedings of IEEE INFOCOM’10. IEEE, pp 1505–1513
Liu Z, Hu H, Liu Y, Ross KW, Wang Y, Mobius M (2010) P2P trading in social networks: the value of staying connected. In: Proceedings of IEEE INFOCOM’10. IEEE, pp 2489–2497
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web (WWW ’03). ACM, pp 640–651
Yamamoto A, Asahara D, Itao T, Tanaka S, Suda T (2004) Distributed pagerank: A distributed reputation model for open peer-to-peer networks. In: Proceedings of the 2004 international symposium on applications and the internet workshops (SAINTW’04). IEEE Computer Society, pp 389–394
Jun S, Ahamad M (2005) Incentives in BitTorrent induce free riding. In: Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems, ser. P2PECON ’05. ACM, pp 116–121
Sherman A, Nieh J, Stein C (2012) FairTorrent: a deficit-based distributed algorithm to ensure fairness in peer-to-peer systems. IEEE/ACM Trans Netw 20(5):1361–1374. [Online]. Available. doi:10.1109/TNET.2012.2185058
Piatek M, Isdal T, Anderson TE, Krishnamurthy A, Venkataramani A (2007) Do incentives build robustness in BitTorrent?. In: Proceedings of the 4th symposium on networked systems design and implementation (NSDI 2007). USENIX
Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on electronic commerce (EC’04). ACM, pp 102–111
Langville AN, Meyer CD (2004) Deeper inside pagerank. Internet Math 1(3):335–380. [Online]. Available: http://akpeters.metapress.com/content/bn22r01j43g6q8g6/
Piatek M, Isdal T, Krishnamurthy A, Anderson TE (2008) One hop reputations for peer to peer file sharing workloads. In: Proceedings of the 5th USENIX symposium on networked systems Design & Implementation (NSDI 2008). USENIX Association , pp 1–14
Delaviz R, Andrade N, Pouwelse JA, Epema DHJ (2012) SybilRes: A sybil-resilient flow-based decentralized reputation mechanism. In: Proceedings of the 2012 IEEE 32nd international conference on distributed computing systems (ICDCS ’12). IEEE Computer Society, pp 203–213
Page L, Brin S, Motwani R, Winograd T (1999) The PageRank citation ranking: Bringing order to the Web. Stanford InfoLab, Technical Report 1999-66, Nov. 1999, previous number = SIDL-WP-1999-0120. [Online]. Available: http://ilpubs.stanford.edu:8090/422/
Varga A (2010) OMNeT++. In: Wehrle K, Günes M, Gross J (eds) Modeling and tools for network simulation. Springer, Berlin, pp 35–59
Locher T, Moor P, Schmid S, Wattenhofer R (2006) Free riding in BitTorrent is cheap. In: Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets), pp 85–90
De Vogeleer K, Erman D, Popescu A (2008) Simulating BitTorrent. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, ser. Simutools ’08. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, pp 2:1–2:7
Acknowledgments
The work of D.Korzun is financially supported by the Ministry of Education and Science of Russia within project no. 2.5124.2017/8.9 of the basic part of state research assignment for 2017–2019. Andrei Gurtov was supported by the Center for Industrial Information Technology (CENIIT).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Gurtov, A., Koskela, J. & Korzun, D. Cyclic ranking in single-resource peer-to-peer exchange. Peer-to-Peer Netw. Appl. 11, 632–643 (2018). https://doi.org/10.1007/s12083-017-0578-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-017-0578-0
Keywords
- Peer-to-peer cooperation
- Incentives
- Reputation
- Fairness
- Provision cycles
- Structural ranking
- Measurements
- Performance