[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Free Riding on Gnutella Revisited: The Bell Tolls?

Published: 01 June 2005 Publication History

Abstract

Individuals who use peer-to-peer (P2P) file-sharing networks such as Gnutella face a social dilemma. They must decide whether to contribute to the common good by sharing files or to maximize their personal experience by free riding, downloading files while not contributing any to the network. Individuals gain no personal benefits from uploading files (in fact, it's inconvenient), so it's "rational" for users to free ride. However, significant numbers of free riders degrade the entire system's utility, creating a "tragedy of the digital commons." In this article, a new analysis of free riding on the Gnutella network updates data from 2000 and points to an increasing downgrade in the network's overall performance and the emergence of a "metatragedy" of the commons among Gnutella developers.

References

[1]
The Gnutella Protocol Specification v0.4, 2000, http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf.
[2]
G. Hardin, "The Tragedy of the Commons," http://www.sciencemag.org/cgi/content/full/162/3859/1243, Science, vol. 162, no. 3859, 1968, pp. 1243–1248.
[3]
E. Adar and B. Huberman, "Free Riding on Gnutella," http://www.firstmonday.dk/issues/issue5_10/adar/index.html, First Monday, Oct. 2000.
[4]
P. Rayson and R. Garside, "Comparing Corpora Using Frequency Polling," Proc. Workshop Comparing Corpora, Assoc. for Computational Linguistics, Oct. 2000, pp. 1–6.
[5]
K. Sripanidkulchai, "The Popularity of Gnutella Queries and Its Implications on Scalability," http://www-2.cs.cmu.edu/~kunwadee/research/p2p/gnutella.html.
[6]
Gnutella 0.6, RFC Gnutella 0.6, June 2002, http://rfc-gnutella.sourceforge.net/src/rfc-0_6-draft.html.
[7]
J. Ritter, "Why Gnutella Can't Scale, No Really," Feb. 2001, http://www.darkridge.com/~jpr5/doc/gnutella.html.
[8]
M. Karakaya I. Korpeoglu, and O. Ulusoy, "A Distributed and Measurement-Based Framework against Free Riding in Peer-to-Peer Networks," http://doi.ieeecomputersociety.org/10.1109/PTP.2004.1334963 Proc. 4th IEEE Int'l Conf. Peer-to-Peer Computing (P2P 04), IEEE CS Press, 2004, pp. 276–277.
[9]
B. Strulo A. Smith, and J. Farr, "An Architecture for Peer-to-Peer Economies," http://doi.ieeecomputersociety.org/10.1109/PTP.2003.1231528, Proc. 3rd IEEE Int'l Conf. Peer-to-Peer Computing (P2P 03), IEEE CS Press, 2003, p. 208.
[10]
D. Hughes I. Warren, and G. Coulson, "AGnuS: The Altruistic Gnutella Server," http://csdl.computer.org/comp/proceedings/p2p/2003/2023/00/20230202abs.htm Proc. 3rd IEEE Int'l Conf. Peer-to-Peer Computing (P2P 03), IEEE CS Press, 2003, p. 202.
[11]
S. Saroiu P. Gummadi, and S. Gribble, "Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts," Multimedia Systems, vol. 9, no. 2, Springer-Verlag, 2003, pp. 170–184.
[12]
C. Blake and R. Rodrigues, "High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two," http://www.usenix.org/events/hotos03/tech/full_papers/blake/blake_html Proc. 9th Workshop Hot Topics in Operating Systems (HotOS-IX), Usenix, 2003.
[13]
J. Walkerdine L. Melville, and I. Sommerville, "Dependability Properties of P2P Architectures," Proc. 2nd IEEE Int'l Conf. Peer-to-Peer Computing (P2P 02), IEEE CS Press, 2002, pp. 173–174.
[14]
Gnutella 0.6, RFC Gnutella 0.6, June 2002, http://rfc-gnutella.sourceforge.net/src/rfc-0_6-draft.html.
[15]
S. Saroiu P. Gummadi, and S. Gribble, "Measuring and Analyzing the Characteristics of Napster and Gnutella Hosts," Multimedia Systems, vol. 9, no. 2, Springer-Verlag, 2003, pp. 170–184.
[16]
C. Blake and R. Rodrigues, "High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two," http://www.usenix.org/events/hotos03/tech/full_papers/blake/blake_html Proc. 9th Workshop Hot Topics in Operating Systems (HotOS-IX), Usenix, 2003.
[17]
E. Adar and B. Huberman, "Free Riding on Gnutella," http://www.firstmonday.dk/issues/issue5_10/adar/index.html First Monday, Oct. 2000.
[18]
K. Gummadi, et al., "Measurement, Modelling and Analysis of a Peer-to-Peer File-Sharing Workload," Proc. 19th ACM Symp. Operating Systems Principles (SOSP), ACM, 2003, pp. 19–22.
[19]
J. Chu K. Labonte, and B. Levine, "Availability and Locality Measurements of Peer-to-Peer File Systems," Proc. ITCom: Scalability and Traffic Control in IP Networks II Conf., SPIE, vol. 4,868, 2002.

Cited By

View all
  • (2024)Poster: Solving the Free-rider Problem in BittensorProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691414(5045-5047)Online publication date: 2-Dec-2024
  • (2023)Topology Analysis of the XRP LedgerProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577611(1277-1284)Online publication date: 27-Mar-2023
  • (2021)Using Bayesian networks with hidden variables for identifying trustworthy users in social networksJournal of Information Science10.1177/016555151985759046:5(600-615)Online publication date: 25-Feb-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Distributed Systems Online
IEEE Distributed Systems Online  Volume 6, Issue 6
June 2005

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 June 2005

Author Tags

  1. Gnutella
  2. Peer-to-peer systems
  3. distributed systems
  4. free riding

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Poster: Solving the Free-rider Problem in BittensorProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691414(5045-5047)Online publication date: 2-Dec-2024
  • (2023)Topology Analysis of the XRP LedgerProceedings of the 38th ACM/SIGAPP Symposium on Applied Computing10.1145/3555776.3577611(1277-1284)Online publication date: 27-Mar-2023
  • (2021)Using Bayesian networks with hidden variables for identifying trustworthy users in social networksJournal of Information Science10.1177/016555151985759046:5(600-615)Online publication date: 25-Feb-2021
  • (2019)Towards a model of interpersonal trust in Social Media ApplicationsProceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good10.1145/3342428.3342674(120-123)Online publication date: 25-Sep-2019
  • (2018)Game theory approach to peer-to-peer video streamingInternational Journal of Autonomous and Adaptive Communications Systems10.5555/3292675.329267811:4(333-364)Online publication date: 1-Jan-2018
  • (2017)Understanding Human-Machine NetworksACM Computing Surveys10.1145/303986850:1(1-35)Online publication date: 4-Apr-2017
  • (2017)InFreDJournal of Network and Computer Applications10.1016/j.jnca.2016.11.00778:C(134-145)Online publication date: 15-Jan-2017
  • (2017)Bayesian resource discovery in infrastructure-less networksInformation Sciences: an International Journal10.1016/j.ins.2016.10.021376:C(95-109)Online publication date: 10-Jan-2017
  • (2016)Combining contribution interactions to increase coverage in mobile participatory sensing systemsProceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/2935334.2935387(365-376)Online publication date: 6-Sep-2016
  • (2016)A Survey of Socially Aware Peer-to-Peer SystemsACM Computing Surveys10.1145/289476149:1(1-28)Online publication date: 12-May-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media