Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Modeling the initial stage of a file sharing process on a BitTorrent network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In this paper, we model the number of seeders during the initial stage of a file sharing process on BitTorrent networks. The initial stage is crucial for successfully identifying the initial seeder, who provided the source of the files on the Internet. Most existing BT models focus on different parameters in the steady state, which occurs at a later stage of a file sharing process. None of them are able to characterize the initial stage. In this study, we propose the first model on capturing the characteristics on the growth of the number of seeders during the initial stage on a BT network. Also, we derive a lower bound for the appearing time of the second seeder and the length of the stationary period. Our model suggests that the number of seeders remain stationary during the starting period of a file sharing process. When it enters the rapid-rising period, it increases more speedily as an increasing number of seeders are available for supplying the rarest pieces. The observed demarcation of the stationary period and the rapid-rising period is significant in identifying the initial seeder on a BT network. If the investigative work can be commenced within the stationary period, the chance of identifying the initial seeder is much higher. On the other hand, if the file distribution has entered the rapid-rising period, one can no longer determine which of the existing seeders is, indeed, the initial seeder.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ascan. http://www.dc3.mil/dcci/dcciAbout.php. Accessed 1 May 2011

  2. Napster. http://music.napster.com/napsterhomemain.htm?signin=1. Accessed 1 May 2011

  3. P2p marshal. http://p2pmarshal.atc-nycorp.com/. Accessed 1 May 2011

  4. Vuze: the most powerful bittorrent app on earth. http://www.vuze.com/. Accessed 1 May 2011

  5. Anti-piracy in Asia Pacific (2009) http://www.mpa-i.org/piracy_home.html. Accessed 1 May 2011

  6. Sandvine: close to half of all bandwidth sucked up by p2p (2009) http://arstechnica.com/news.ars/post/20080623.html

  7. Bangeman E (2007) P2p responsible for as much as 90 percent of all net traffic. http://arstechnica.com/news.ars/post/20070903.html

  8. Bharambe AR, Herley C, Padmanabhan VN (2005) Some observations on bittorrent performance. Perform Eval Rev 33:2005

    Article  Google Scholar 

  9. Cohen B (2003) Incentives build robustness in bittorrent. http://www2.sims.berkeley.edu/research/conferences/p2pecon/papers/s4-cohen.pdf. Accessed 1 May 2011

  10. Dale C, Liu J (2007) A measurement study of piece population in bittorrent. In: GLOBECOM’07, pp 405–410

  11. Dán G, Carlsson N (2009) Dynamic swarm management for improved bittorrent performance. In: Proceedings of the 8th international conference on peer-to-peer systems. USENIX Association, Berkeley, CA, USA, IPTPS’09, pp 10–10. http://portal.acm.org/citation.cfm?id=1855663.1855673

  12. Fan B (2006) Stochastic differential equation approach to model bittorrent-like p2p systems. In: In Proceedings of IEEE ICC

  13. Fisk NW (2009) Understanding online piracy: the truth about illegal file sharing. Praeger, New York

    Google Scholar 

  14. Ge Z, Figueiredo DR, Jaiswal S, Kurose J, Towsley D (2003) Modeling peer-peer file sharing systems. In: Proceedings of INFOCOM 2003, pp 2188–2198

  15. Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X (2005) Measurements, analysis, and modeling of bittorrent-like systems. In: Proceedings of the 5th ACM SIGCOMM conference on internet measurement, USENIX Association, Berkeley, CA, USA, IMC ’05, pp 4–4. http://portal.acm.org/citation.cfm?id=1251086.1251090

  16. Hendrik S, Klaus M (2009) Internet study 2008/2009. http://www.ipoque.com/resources/internet-studies

  17. Ieong R, Lai K, Chow K, Law F, Kwan M, Tse K (2009) A model for foxy peer-to-peer network investigations. In: Fifth annual IFIP WG 11.9 international conference on digital forensics, advances in digital forensics V, pp 175–186

  18. Ieong R, Lai K, Chow K, Kwan M, Law F (2010) Identifying first seeders in foxy peer-to-peer networks. In: Sixth annual IFIP WG 11.9 international conference on digital forensics, advances in digital forensics VI, pp 151–170

  19. Ieong R, Lai K, Chow K, Kwan M, Law F, Tse H, Tse K (2010) Handbook of research on computational forensics, digital crime and investigation: methods and solution, IGI Global, United Kingdom, chap. Forensic Investigation of Peer-to-Peer Networks, pp 355–378

  20. Intellectual Property Department TGoHKSAR (0000) Awardness of protection of intellectual property rights increases. http://www.info.gov.hk/gia/general/200601/19/P200601190149.htm

  21. Jun S, Ahamad M (2005) Incentives in bittorrent induce free riding. In: Proceedings of the 2005 ACM SIGCOMM workshop on economics of peer-to-peer systems, P2PECON ’05. ACM, New York, NY, USA, pp 116–121. doi:10.1145/1080192.1080199

    Chapter  Google Scholar 

  22. Karagiannis T, Broido A, Brownlee N, Claffy K, Faloutsos M (2004) Is P2P dying or just hiding? Global Internet and Next Generation Networks, Dallas, Texas, Globecom 2004

  23. Kingman JFC (1993) Poisson processes. Clarendon Press, Oxford

    MATH  Google Scholar 

  24. Legout A, Urvoy-Keller G, Michiardi P (2006) Rarest first and choke algorithms are enough. In: Proceedings of the 6th ACM SIGCOMM conference on internet measurement, IMC ’06. ACM, New York, NY, USA, pp 203–216. doi:10.1145/1177080.1177106

    Google Scholar 

  25. Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) Bittorrent is an auction: analyzing and improving bittorrent’s incentives. SIGCOMM Comput Commun Rev 38:243–254. doi:10.1145/1402946.1402987

    Article  Google Scholar 

  26. Qiu D, Srikant R (2004) Modeling and performance analysis of bit torrent-like peer-to-peer networks. In: ACM SIGCOMM

  27. Scottsdale A (2008) The value of unlicensed music shared worldwide on p2p networks in 2007 was US$ 69 billion. http://www.multimediaintelligence.com/

  28. Software SF Forensics p2p. http://www.spearforensics.com/products/forensicp2p/. Accessed 1 May 2011

  29. Veciana GD, Yang X (2003) Fairness, incentives and performance in peer-to-peer networks. In: The forty-first annual allerton conference on communication, control and computing

  30. Ye L, Zhang H, Li F, Su M (2010) A measurement study on bittorrent system. Int J Commun Netw Syst Sci 3(12):916–924

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pierre K. Y. Lai.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lai, P.K.Y., Chow, K.P., Hui, L.C.K. et al. Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Netw. Appl. 7, 311–319 (2014). https://doi.org/10.1007/s12083-011-0118-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-011-0118-2

Keywords