Re: [p2pi] One thought on "leech killing"
John Leslie <john@jlc.net> Mon, 02 June 2008 18:53 UTC
Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BF7323A69DA; Mon, 2 Jun 2008 11:53:03 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5C3BE3A6B24 for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 11:53:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.359
X-Spam-Level:
X-Spam-Status: No, score=-1.359 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6SasDc4mkjO9 for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 11:53:01 -0700 (PDT)
Received: from mailhost.jlc.net (mailhost.jlc.net [199.201.159.9]) by core3.amsl.com (Postfix) with ESMTP id 862E03A69B1 for <p2pi@ietf.org>; Mon, 2 Jun 2008 11:52:18 -0700 (PDT)
Received: by mailhost.jlc.net (Postfix, from userid 104) id 7866433C29; Mon, 2 Jun 2008 14:52:20 -0400 (EDT)
Date: Mon, 02 Jun 2008 14:52:20 -0400
From: John Leslie <john@jlc.net>
To: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
Message-ID: <20080602185220.GA10817@verdi>
References: <06B2829F-96D5-4292-B18C-E1EBEF8A4C64@icsi.berkeley.edu>
Mime-Version: 1.0
Content-Disposition: inline
In-Reply-To: <06B2829F-96D5-4292-B18C-E1EBEF8A4C64@icsi.berkeley.edu>
User-Agent: Mutt/1.4.1i
Cc: p2pi@ietf.org
Subject: Re: [p2pi] One thought on "leech killing"
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org
Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> wrote: > > Comcast's traffic management of bulk-data P2P was reportedly just > "leech/seed" killing. And this appears to be correct based on our > study of injected RSTs (in submission) [1] > > The interesting question is as follows: > > 1: For leech killing, it can be strongly argued that this benefits the > customer while hurting BitTorrent. You would do better if your client > only talks to people who have blocks you don't have. Certainly there are any number of lawyers who would be happy to argue that for $250 per hour. I don't volunteer to pay them... I take issue with your measure of "benefit" to the customer. In general, the customer is considered a better judge of perceived benefit than the supplier. Or did Comcast offer this as a opt-in service to customers? If so, it would be interesting to know what percentage opted in. There are indeed _some_ customers driven by pure greed to take whatever they can and give nothing back. IMHO, those folks will leach off their neighbor's wireless instead of paying Comcast: thus I believe it reasonable to conclude that the _paying_ customers are willing to give something back. Recall that upstream and downstream bandwidths are separate issues: the technology imposes no significant cost on one from using the other. > 2: For seed killing, if the user was just a participant and did not > deliberately leave the client open, this benefits the customer. (I suppose I should thank you for recognizing that some customers intentionally act to give something back.) This particular "benefit" escapes me. If the computer is unattended, I see no possibility of a "cost" to be avoided; if the user is typing or clicking to some other application, the "cost" is too small to measure. > 3: For seed killing, if the user is deliberately acting as a seed, > this penalizes the customer. And they should have been provided > notice and a workaround. There are shades of "deliberately"... They were, of course, provided notice of sorts -- the "no servers" clause in their service agreement. And I don't mean to fault Comcast for putting in such a clause. Nor is it necessarily Comcast's responsibility to provide the workaround. If Comcast is to be faulted here, it must be for "forging" the RSTs. > But the first two cases are part of the classic conflict in > BitTorrent: the rest of the swarm benefits from allowing leeching and > seeding, but the user doesn't (as well as any other flows sharing a > bottleneck with the user). Interestingly, this "classic conflict" was never talked about when BitTorrent was operating between user who all had symmetric upstream and downstream bit-rates. Indeed, I consider it wrong to cast the conflict that way for asymmetric service (cable and most telco DSL). Instead, I would cast the conflict as a failure of P2P programmers to recognize upstream congestion issues and ensure that they don't overload the upstream. > This brings up two interesting questions: > > a) Is it ok for ISP traffic management be limited to solely > benefitting their customers or must it ignore behavior that benefits > the rest of the aggregate that have the effect of penalizing ALL their > customers? Clearly, "must ignore" would be stupid. To say it more nicely, any ISP whose customers experience excessive upstream congestion "must" do something to alleviate it. Ideally, this would include any necessary upgrades to increase upstream bandwidth. In the short term, there are a number of well-established principles for bandwidth limiting. (Google for "dummynet" if you don't know them.) > b) How do bulk-data P2P systems evolve if participants are FORCED to > eliminate "altruistic" behavior (allowing leeches), but limited to > "reciprical" and "greedy" behaviors? I don't understand the question. -- John Leslie <john@jlc.net> _______________________________________________ p2pi mailing list p2pi@ietf.org https://www.ietf.org/mailman/listinfo/p2pi
- [p2pi] One thought on "leech killing" Nicholas Weaver
- Re: [p2pi] One thought on "leech killing" John Leslie
- Re: [p2pi] One thought on "leech killing" Robb Topolski
- Re: [p2pi] One thought on "leech killing" Nicholas Weaver