Re: [p2pi] One thought on "leech killing"

John Leslie <john@jlc.net> Mon, 02 June 2008 18:53 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BF7323A69DA; Mon, 2 Jun 2008 11:53:03 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5C3BE3A6B24 for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 11:53:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.359
X-Spam-Level:
X-Spam-Status: No, score=-1.359 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6SasDc4mkjO9 for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 11:53:01 -0700 (PDT)
Received: from mailhost.jlc.net (mailhost.jlc.net [199.201.159.9]) by core3.amsl.com (Postfix) with ESMTP id 862E03A69B1 for <p2pi@ietf.org>; Mon, 2 Jun 2008 11:52:18 -0700 (PDT)
Received: by mailhost.jlc.net (Postfix, from userid 104) id 7866433C29; Mon, 2 Jun 2008 14:52:20 -0400 (EDT)
Date: Mon, 02 Jun 2008 14:52:20 -0400
From: John Leslie <john@jlc.net>
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
Message-ID: <20080602185220.GA10817@verdi>
References: <06B2829F-96D5-4292-B18C-E1EBEF8A4C64@icsi.berkeley.edu>
Mime-Version: 1.0
Content-Disposition: inline
In-Reply-To: <06B2829F-96D5-4292-B18C-E1EBEF8A4C64@icsi.berkeley.edu>
User-Agent: Mutt/1.4.1i
Cc: p2pi@ietf.org
Subject: Re: [p2pi] One thought on "leech killing"
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> wrote:
> 
> Comcast's traffic management of bulk-data P2P was reportedly just  
> "leech/seed" killing.  And this appears to be correct based on our  
> study of injected RSTs (in submission) [1]
> 
> The interesting question is as follows:
> 
> 1: For leech killing, it can be strongly argued that this benefits the  
> customer while hurting BitTorrent.  You would do better if your client  
> only talks to people who have blocks you don't have.

   Certainly there are any number of lawyers who would be happy to argue
that for $250 per hour. I don't volunteer to pay them...

   I take issue with your measure of "benefit" to the customer. In general,
the customer is considered a better judge of perceived benefit than the
supplier. Or did Comcast offer this as a opt-in service to customers? If
so, it would be interesting to know what percentage opted in.

   There are indeed _some_ customers driven by pure greed to take whatever
they can and give nothing back. IMHO, those folks will leach off their
neighbor's wireless instead of paying Comcast: thus I believe it reasonable
to conclude that the _paying_ customers are willing to give something back.

   Recall that upstream and downstream bandwidths are separate issues:
the technology imposes no significant cost on one from using the other.

> 2: For seed killing, if the user was just a participant and did not  
> deliberately leave the client open, this benefits the customer.

   (I suppose I should thank you for recognizing that some customers
intentionally act to give something back.)

   This particular "benefit" escapes me. If the computer is unattended,
I see no possibility of a "cost" to be avoided; if the user is typing
or clicking to some other application, the "cost" is too small to measure.

> 3: For seed killing, if the user is deliberately acting as a seed,  
> this penalizes the customer.  And they should have been provided  
> notice and a workaround.

   There are shades of "deliberately"...

   They were, of course, provided notice of sorts -- the "no servers"
clause in their service agreement. And I don't mean to fault Comcast
for putting in such a clause. Nor is it necessarily Comcast's
responsibility to provide the workaround.

   If Comcast is to be faulted here, it must be for "forging" the RSTs.

> But the first two cases are part of the classic conflict in  
> BitTorrent:  the rest of the swarm benefits from allowing leeching and  
> seeding, but the user doesn't (as well as any other flows sharing a  
> bottleneck with the user).

   Interestingly, this "classic conflict" was never talked about when
BitTorrent was operating between user who all had symmetric upstream
and downstream bit-rates. Indeed, I consider it wrong to cast the
conflict that way for asymmetric service (cable and most telco DSL).

   Instead, I would cast the conflict as a failure of P2P programmers
to recognize upstream congestion issues and ensure that they don't
overload the upstream.

> This brings up two interesting questions:
> 
> a) Is it ok for ISP traffic management be limited to solely  
> benefitting their customers or must it ignore behavior that benefits  
> the rest of the aggregate that have the effect of penalizing ALL their  
> customers?

   Clearly, "must ignore" would be stupid.

   To say it more nicely, any ISP whose customers experience excessive
upstream congestion "must" do something to alleviate it. Ideally, this
would include any necessary upgrades to increase upstream bandwidth.
In the short term, there are a number of well-established principles
for bandwidth limiting. (Google for "dummynet" if you don't know them.)

> b)  How do bulk-data P2P systems evolve if participants are FORCED to  
> eliminate "altruistic" behavior (allowing leeches), but limited to  
> "reciprical" and "greedy" behaviors?

   I don't understand the question.

--
John Leslie <john@jlc.net> 
_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi