Understanding Peer Exchange in BitTorrent Systems

Peer Exchange (PEX), in which peers directly exchange with each other lists of active peers in the torrent, has been widely implemented in modern BitTorrent clients for decentralized peer discovery. However, there is little knowledge about the behavior of PEX in operational systems. In this paper, we perform both passive measurements and Planetlab experiments to study the impact and properties of BitTorrent PEX. We first study the impact of PEX on the download efficiency of BitTorrent. We observe that PEX can significantly reduce the download time for some torrents. We then analyze the freshness, redundancy and spread speed of PEX messages. Finally, we also conduct large- scale Planetlab experiments to understand the impact of PEX on the overlay properties of BitTorrent.

[1]  Mikel Izal,et al.  Dissecting BitTorrent: Five Months in a Torrent's Lifetime , 2004, PAM.

[2]  Eddie Kohler,et al.  Clustering and sharing incentives in BitTorrent systems , 2006, SIGMETRICS '07.

[3]  Daniel Stutzbach,et al.  Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[4]  Bo Li,et al.  Evolution and Enhancement of BitTorrent Network Topologies , 2008, 2008 16th Interntional Workshop on Quality of Service.

[5]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[6]  Xiaoning Ding,et al.  A performance study of BitTorrent-like peer-to-peer systems , 2007, IEEE Journal on Selected Areas in Communications.

[7]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.

[8]  Moritz Steiner,et al.  Faster Content Access in KAD , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[9]  Thomas E. Anderson,et al.  Profiling a million user dht , 2007, IMC '07.

[10]  Xiaoning Ding,et al.  Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.

[11]  B. Levine,et al.  Exploring the Use of BitTorrent as the Basis for a Large Trace Repository , 2004 .

[12]  Guillaume Urvoy-Keller,et al.  Rarest first and choke algorithms are enough , 2006, IMC '06.

[13]  Chadi Barakat,et al.  Understanding the Properties of the BitTorrent Overlay , 2007, ArXiv.

[14]  Arun Venkataramani,et al.  Availability in BitTorrent Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  Taoufik En-Najjary,et al.  A global view of kad , 2007, IMC '07.