RE: BitTorrent Methodology

From: Ben Grodsky <>
Date: Thu, 3 May 2007 14:36:32 -0700

man, you're good. it's almost as if you said something, but not really. :)
they really screwed up by not letting you and Necip duke it out scientist vs. scientist. that would've been a great miivi clip.


From: Jay Mairs
Sent: Thu 03-May-07 14:33
To: Skinner, Andrew (NBC Universal); Ben Grodsky
Cc: Markham, Aaron (NBC Universal); Ben Ebert
Subject: RE: BitTorrent Methodology



I assume these questions are for all networks, not just Bittorrent (as the subject implies).


1. IP addresses are not (and cannot be) collected by protection(countermeasures) computers. In fact, this is why we developed a separate data collection system for your data feeds.

2. Supply collection implementation details vary by network. In general, supply corresponds to a user sharing a file with a certain hash on a certain day. A user will be counted again if revisited on a different day, but not if it's the same day.

3. Demand collection also varies by network. Demand is defined as a keyword search by a user. These are counted daily to give a daily demand number. If a user types in a search string and hits the search button, that will be counted once. If the same user does a second search, that will also be counted once.

4. Our countermeasures are removed prior to the calculation of the demand and supply numbers, so they don't have any effect on them.



Jay Mairs


From: Skinner, Andrew (NBC Universal) []
Sent: Thursday, May 03, 2007 1:50 PM
To: Ben Grodsky; Jay Mairs
Cc: Markham, Aaron (NBC Universal)
Subject: RE: BitTorrent Methodology
Importance: High


Next Thursday will be fine. I think that most of the questions about supply and demand can be answered through some quick email exchanges though. Jay, would you mind sparing a few moments to clarify the following:


1. Are IP addresses time stamped and collected during countermeasures? Is it possible to figure out if countermeasures were used on user X, and If so, how many times and when? During the call we will most likely be discussing these questions in regard to ed2k user hash.



2. How is supply measured and collected? Basically, how do you define supply? If a swarm is entered and supply data is captured will existing users be counted again if it is revisited at a later time?



3. How is demand measured and collected? How do you define demand?



4. How do spoofs, decoys, swarming, and interdiction affect supply and demand numbers? Are these counts included, counted separate, or not included in the supply/demand numbers?










From: Ben Grodsky []
Sent: Wednesday, May 02, 2007 12:19 PM
To: Skinner, Andrew (NBC Universal); Markham, Aaron (NBC Universal)
Cc: Randy Saaf; Jay Mairs
Subject: RE: BitTorrent Methodology


Aaron and Andrew,

Attached please find our BitTorrent testing methodology. This is what our QA team does. We added the last step as a way for your team to help us improve our BitTorrent effectiveness for your titles.




From: Ben Grodsky
Sent: Tue 01-May-07 15:13
To: ''; Jay Mairs
Cc: ''
Subject: Re:


I'm out Thursday (this week) through Wednesday (next week). Could we set a call for Thursday next week?


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <>
To: Ben Grodsky; Jay Mairs
Cc: Doganaksoy, Necip (GE, Research) <>
Sent: Tue May 01 14:56:03 2007

Hi Ben & Jay,

Are you guys open for a call this Friday? Necip and I would like to discuss how supply and demand are measured, as well as how user hashes are collected. I'll be free for the rest of the day if one of you would like to clear some stuff up ahead of time.



Received on Fri Sep 14 2007 - 10:55:56 BST

This archive was generated by hypermail 2.2.0 : Sun Sep 16 2007 - 22:19:46 BST