RE: BitTorrent Methodology

From: Skinner, Andrew \(NBC Universal\) <>
Date: Thu, 3 May 2007 15:11:22 -0700

Hi Jay,


Thanks for the quick reply. The questions were aimed at all networks. I
only have one follow up question for you.


1. If the countermeasures computers do not collect information to
ID a person, will the data collection system do it? Or what kind of data
is collected in that system? The goal is to be able to process a list of
IPs to see if you have interacted any of them, and at what time(s).







From: Jay Mairs []
Sent: Thursday, May 03, 2007 2:33 PM
To: Skinner, Andrew (NBC Universal); Ben Grodsky
Cc: Markham, Aaron (NBC Universal); Ben Ebert
Subject: RE: BitTorrent Methodology




I assume these questions are for all networks, not just Bittorrent (as
the subject implies).


1. IP addresses are not (and cannot be) collected by
protection(countermeasures) computers. In fact, this is why we
developed a separate data collection system for your data feeds.

2. Supply collection implementation details vary by network. In
general, supply corresponds to a user sharing a file with a certain
hash on a certain day. A user will be counted again if revisited on a
different day, but not if it's the same day.

3. Demand collection also varies by network. Demand is defined as
a keyword search by a user. These are counted daily to give a daily
demand number. If a user types in a search string and hits the search
button, that will be counted once. If the same user does a second
search, that will also be counted once.

4. Our countermeasures are removed prior to the calculation of the
demand and supply numbers, so they don't have any effect on them.



Jay Mairs


From: Skinner, Andrew (NBC Universal) []

Sent: Thursday, May 03, 2007 1:50 PM
To: Ben Grodsky; Jay Mairs
Cc: Markham, Aaron (NBC Universal)
Subject: RE: BitTorrent Methodology
Importance: High


Next Thursday will be fine. I think that most of the questions about
supply and demand can be answered through some quick email exchanges
though. Jay, would you mind sparing a few moments to clarify the


1. Are IP addresses time stamped and collected during countermeasures?
Is it possible to figure out if countermeasures were used on user X, and
If so, how many times and when? During the call we will most likely be
discussing these questions in regard to ed2k user hash.



2. How is supply measured and collected? Basically, how do you define
supply? If a swarm is entered and supply data is captured will existing
users be counted again if it is revisited at a later time?



3. How is demand measured and collected? How do you define demand?



4. How do spoofs, decoys, swarming, and interdiction affect supply and
demand numbers? Are these counts included, counted separate, or not
included in the supply/demand numbers?










From: Ben Grodsky []
Sent: Wednesday, May 02, 2007 12:19 PM
To: Skinner, Andrew (NBC Universal); Markham, Aaron (NBC Universal)
Cc: Randy Saaf; Jay Mairs
Subject: RE: BitTorrent Methodology


Aaron and Andrew,

Attached please find our BitTorrent testing methodology. This is what
our QA team does. We added the last step as a way for your team to help
us improve our BitTorrent effectiveness for your titles.




From: Ben Grodsky
Sent: Tue 01-May-07 15:13
To: ''; Jay Mairs
Cc: ''
Subject: Re:


I'm out Thursday (this week) through Wednesday (next week). Could we set
a call for Thursday next week?


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <>
To: Ben Grodsky; Jay Mairs
Cc: Doganaksoy, Necip (GE, Research) <>
Sent: Tue May 01 14:56:03 2007

Hi Ben & Jay,

Are you guys open for a call this Friday? Necip and I would like to
discuss how supply and demand are measured, as well as how user hashes
are collected. I'll be free for the rest of the day if one of you would
like to clear some stuff up ahead of time.



Received on Fri Sep 14 2007 - 10:56:04 BST

This archive was generated by hypermail 2.2.0 : Sun Sep 16 2007 - 22:19:48 BST