BatTorrent: A Battery-Aware BitTorrent for Mobile Devices Zach King, Jeremy Blackburn, Adriana Iamnitchi Computer Science and Engineering, University of.

Slides:



Advertisements
Similar presentations
P2P Streaming Protocol Pro- incentive Parameters draft-zeng-ppsp-protocol-pro-incentive-para-01 IETF79 Meeting Wenjun (Kevin) Zeng & Yingjie Gu Huawei.
Advertisements

Layered Video for Incentives in P2P Live Streaming
Peter R. Pietzuch Peer-to-Peer Computing – or how to make your BitTorrent downloads go faster... Peter Pietzuch Large-Scale Distributed.
MicroCast: Cooperative Video Streaming on Smartphones Lorenzo Keller, Anh Le, Blerim Cic, Hulya Seferoglu LIDS, Christina Fragouli, Athina Markopoulou.
Rarest First and Choke Algorithms Are Enough
Rarest First and Choke Algorithms are Enough Arnaud LEGOUT INRIA, Sophia Antipolis France G. Urvoy-Keller and P. Michiardi Institut Eurecom France.
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
Presented by: Su Yingbin. Outline Introduction SocialSwam Design Notations Algorithms Evaluation Conclusion.
Agenda Introduction BT + Multimedia Experimental Conclusion 2.
Presentation by Manasee Conjeepuram Krishnamoorthy.
1 Communication Networks Kolja Eger, Prof. Dr. U. Killat 1 From Packet-level to Flow-level Simulations of P2P Networks Kolja Eger, Ulrich Killat Hamburg.
On the Economics of P2P Systems Speaker Coby Fernandess.
Seed Scheduling for Peer-to-Peer Networks Flavio Esposito Ibrahim Matta Pietro Michiardi Nobuyuki Mitsutake Damiano Carra.
Clustering and Sharing Incentives in BitTorrent Systems Arnaud Legout 1, Nikitas Liogkas 2, Eddie Kohler 2, Lixia Zhang 2 1 INRIA, Projet Planète, Sophia.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
Modelling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks.
Exploiting BitTorrent For Fun (But Not Profit) Nikitas Liogkas, Robert Nelson, Eddie Kohler, Lixia Zhang University of California, Los Angeles.
Free-riding in BitTorrent Networks with the Large View Exploit Michael Sirivianos, Jong Han Park, Rex Chen and Xiaowei Yang University of California, Irvine.
CS 554. Peer-to-Peer Systems Faithfulness in Internet Algorithms Haridimos Kondylakis
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Performance Modeling and Engineering Issues of BT-Like File Sharing Systems M.H. Lin, John C.S. Lui, D.M. Chiu The Chinese University of Hong Kong.
CMPT 401 Summer 2007 Dr. Alexandra Fedorova Lecture XV: Real P2P Systems.
Alex Sherman Jason Nieh Cliff Stein.  Lack of fairness in bandwidth allocation in P2P systems:  Users are not incentivized to contributed bandwidth.
Motivation Due to the development of new Internet access technologies (DSL's and HFC's), VoD services have become increasingly popular Despite the continuous.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.
Modeling and analysis of BitTorrent-like P2P network Fan Bin Oct,1 st,2004.
A P2P file distribution system ——BitTorrent Fan Bin Sep,25,2004.
Incentives Build Robustness in BitTorrent 1st Workshop on Economics of Peer-to-Peer Systems 2003 Bram Cohen
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Leveraging Social Networks for Increased BitTorrent Robustness Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
BitTorrent Internet Technologies and Applications.
BitTorrent Under a Microscope: Towards Static QoS Provision in Dynamic Peer-to-Peer Networks Tom H. Luan*, Xuemin (Sherman) Shen* and Danny H. K. Tsang.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
BitTorrent Dr. Yingwu Zhu. Bittorrent A popular P2P application for file exchange!
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Do incentives build robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
1 Insertion of ISP-owned Peer & Locality Awareness in BitTorrent Ioanna Papafili, George D. Stamoulis, Sergios Soursos AUEB EuroNF workshop, Athens October.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
MULTI-TORRENT: A PERFORMANCE STUDY Yan Yang, Alix L.H. Chow, Leana Golubchik Internet Multimedia Lab University of Southern California.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Title: Comparison of Enhanced Slotted Mode vs Periodical Power Off Abstract: This contribution summarizes the comparison of the enhanced slotted mode.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
Doc.: IEEE Submission November 2003, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Lecture XV: Real P2P Systems
FairTorrent: BrinGing Fairness to Peer-to-Peer Systems
Introduction to BitTorrent
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
Consumed Energy (100 records) Your university logo here
Designing a new BitTorrent Client
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Managing Inter-domain Traffic in the Presence of BitTorrent File-Sharing Srinivasan Seetharaman and Mostafa Ammar School of Computer Science Objective:
BitTorrent on Mobile Devices
Do incentives build robustness in BitTorrent?
Simplified Explanation of “Do incentives build robustness in BitTorrent?” By James Hoover.
The BitTorrent Protocol
Javad Ghaderi, Tianxiong Ji and R. Srikant
Submission Title: [Regulatory Update]
Presentation transcript:

BatTorrent: A Battery-Aware BitTorrent for Mobile Devices Zach King, Jeremy Blackburn, Adriana Iamnitchi Computer Science and Engineering, University of South Florida Acknowledgements: This material is based upon work supported by the National Science Foundation under Grant No. CNS MOTIVATION Introducing BitTorrent to mobile devices (i.e., mobile phones) dramatically increases both the concern and consequences for power loss. BitTorrent's tit-for-tat mechanism ensures that all peers, including mobile peers, must upload content in order to download content. As transmission of data necessarily consumes more energy than reception of data, a mobile BitTorrent peer is faced with a conundrum: maximize upload bandwidth to receive the reciprocal download bandwidth and drain battery or limit the rate of data upload and suffer the consequences of the tit-for-tat enforcement. def choking_algorithm(peers) # determine regular unchokes peers.sort(R) # R = Ordering Function Num_unchokes.times do |peer_index| peers[peer_index].unchoke end # choke everyone else choked_peers = peers[Num_unchokes, peers.length] choked_peers.each do |peer_to_choke| peer_to_choke.choke end # perform optimistic unchokes choked_peers[rand(choked_peers.length)].unchoke end PROPOSED SOLUTION Scaling the upload rate of peers as a function of remaining battery life, while also inversely scaling the rate measures, will allow a battery proportionate contribution to the swarm without suffering the penalties associated with scaled upload rates. BatTorrent is integrated with a social strength service to mitigate the risk of peers lying about their battery level to gain an unfair advantage. BITTORRENT MODIFICATIONS 3) Modify the choking algorithm to manage the scaled uploads 2) Allow peers to scale upload based on battery level1) Introduce a new message type, BATT FUTURE WORK We are currently investigating other scaling functions. In addition, we are examining a battery level threshold approach to BatTorrent bandwidth scaling. While we have a proof of concept of BatTorrent running on the Android emulator and a G1 dev phone, experiments composed primarily of mobile devices will come soon. PRELIMINARY RESULTS BatTorrent is implemented on Android G1 phone and preliminary experiments at scale on PlanetLab Rate Ordering Function R: BitTorrent: Strictly based on upload rate, r. BatTorrent: Compensates for scaled uploads based on f(r, batt, socs) Rate Ordering Function R: BitTorrent: Strictly based on upload rate, r. BatTorrent: Compensates for scaled uploads based on f(r, batt, socs) Num_unchokes: Represents the number of unchoke slots available. While the BitTorrent specification indicates four slots, this can vary per client. Num_unchokes: Represents the number of unchoke slots available. While the BitTorrent specification indicates four slots, this can vary per client. Optimistic Unchokes: Per BitTorrent spec one slot is reserved for a random peer to be unchoked, which allows new peer discovery. Optimistic Unchokes: Per BitTorrent spec one slot is reserved for a random peer to be unchoked, which allows new peer discovery. 4) Social strength service Rely on a social strength service to infer social-based trust to help mitigate gaming and provide incentives for resource sharing