SlideShare une entreprise Scribd logo
1  sur  17
Bit torrent Technology Done by: Swathi Raman 08D2754
BitTorrent Bram Cohen is the creator of BitTorrent, one of the most successful peer-to-peer programs ever.  BitTorrent is a protocol (a set of rules that different computer systems agree to use) based on P2P that can be used to share large files very efficiently, using minimum bandwidth. It is just a tool used to download, it does not contain a built-in search facility. The .torrent files are usually located via HTTP thru search engines and trackers.
Torrent Lingo Torrent – At the beginning of all this is the torrent file itself. The .torrent file is not the entire file. It is extremely small and it just contains the information that points to the actual file and the people who are sharing it. It is like a map which is used by the BitTorrent client to assemble all the pieces together. BitTorrent client – A Bit Torrent client is one of the most important parts of the torrent process. It is a piece of software which takes the .torrent file, reads the information in it and starts the download. Peer - A peer is any computer participating in the download and upload of a torrent file.
(contd..) Seeder - A seed (or seeder) is anyone who has a complete copy of the file being shared across the torrent network. Leecher - A leech (or a leecher) is the person who does not have the complete file yet but has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network. Share ratio – The ratio is the amount of data a user has uploaded divided by the amount of data they have downloaded for a particular torrent (UL÷DL). A share ratio of 1+ has a positive effect on the user’s reputation because it means that the user has sent more data to other users than he has received. Conversely, share ratios under 1 have a negative effect.
(contd..) Swarm – The swarm is the sum total of all the leechers and seeders (i.e. all the computers) participating in the torrent process. Tracker – The tracker is a server which has the information of who has what files and who needs which ones, thus acting as a bridge between seeders and leechers. Some trackers are private requiring a registration where most are public. Index – An index is, as the name implies, a searchable list of .torrent files, hosted on a website.
Traditional Client-server downloading Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients. It works like this:                    - You open a Web page and click a link to download a file      to your computer.                     - The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer.                     - The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (Hypertext Transfer Protocol).
Drawbacks Traffic congestion on the network has been an issue since the inception of the client-server paradigm. As the number of simultaneous client requests to a given server increases, the server can become overloaded.  The client-server paradigm lacks the robustness of a good P2P network. Under client-server, should a critical server fail, clients’ requests cannot be fulfilled. In P2P networks, resources are usually distributed among many nodes.
The BitTorrent Protocol Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. BitTorrent is a peer-to-peer file sharing protocol allowing users to distribute large amounts of data without putting the level of strain on their computers that would be needed for standard Internet hosting. The protocol works as an alternative data distribution method that makes even small computers with low bandwidth capable of participating in large data transfers.
COMPONENTS OF THE PROTOCOL Metainfo file- Describes metadata about the sharing file(s), and the tracker, and has the file ending .torrent.  Tracker- A central server keeping track of peers and seeds sharing and downloading the file(s). Peer- A user on the network downloading the file(s), and sharing the parts that have been successfully downloaded. Seed- A peer that has the complete file or files available for sharing. At least one seed is needed in the beginning for the sharing to be possible. Client.-An application implementing the BitTorrent protocol.
Operation You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file and those with a portion of the file. The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer.
(contd..) Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download.  By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file.
Advantages BitTorrent is an open-source program offers a spyware- and nuisance-free installation.  Allows users to share large amounts of data in a short span of time. Discourages “freeloading” by rewarding fastest uploaders. BitTorrent requires that users share files back with the community, so no one can get files without also giving files — this level of reciprocity makes the system stronger and faster. The more popular a file is — the more people want a copy of it — the faster it can be downloaded, because there are more places to get pieces of it.
(Contd..) Does not require high technical knowledge to use  the BitTorrent- an average person needs not a user guide . By downloading a fraction of the file (1/10th) from ten to fifteen computers at the same time, the file is downloaded much faster. BitTorrent enables distributors to share the distribution load with all the people who get a copy of it, reducing the bandwidth burden on the distributor.
Limitations Lack of anonymity- BitTorrent does not offer its users anonymity.  The leech problem- A BitTorrent user may often choose to leave the swarm as soon as they have a complete copy of the file they are downloading.  The cheater problem- There are "cheating" clients like BitThief which claim to be able to download without uploading.  Speed- Average BitTorrent download speed is limited by the combined average upload speed of "peers" (other nodes with partial copies which are also downloading) and "seeds" (complete copies that are only uploading).
THANK YOU

Contenu connexe

Tendances

One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim ITU
 
Design Cloud system: InfiniBand vs. Ethernet
Design Cloud system: InfiniBand vs. EthernetDesign Cloud system: InfiniBand vs. Ethernet
Design Cloud system: InfiniBand vs. EthernetPatrik Kristel
 
Generic framing procedure
Generic framing procedureGeneric framing procedure
Generic framing procedureSudanshu Gupta
 
MATERI ROUTING STATIS (2).pptx
MATERI ROUTING STATIS (2).pptxMATERI ROUTING STATIS (2).pptx
MATERI ROUTING STATIS (2).pptxRamziNadhifHakim
 
Sister 011 - network file system
Sister   011 - network file systemSister   011 - network file system
Sister 011 - network file systemFebriyani Syafri
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)NetProtocol Xpert
 
Optical Transport Network (OTN) Tutorial
Optical Transport Network (OTN) TutorialOptical Transport Network (OTN) Tutorial
Optical Transport Network (OTN) Tutorialibrahimnabil17
 
Tutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlowTutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlowKingston Smiler
 
Cloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFCloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFRaphaël PINSON
 
RPP - Administrasi Infrastruktur Jaringan | Kelas XI
RPP - Administrasi Infrastruktur Jaringan | Kelas XIRPP - Administrasi Infrastruktur Jaringan | Kelas XI
RPP - Administrasi Infrastruktur Jaringan | Kelas XIWalid Umar
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsHarsh Mehta
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappNetwork Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappGLC Networks
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switchingSumita Das
 

Tendances (20)

One World One Global Sim
One World One Global Sim One World One Global Sim
One World One Global Sim
 
InfiniBand FAQ
InfiniBand FAQInfiniBand FAQ
InfiniBand FAQ
 
Design Cloud system: InfiniBand vs. Ethernet
Design Cloud system: InfiniBand vs. EthernetDesign Cloud system: InfiniBand vs. Ethernet
Design Cloud system: InfiniBand vs. Ethernet
 
Generic framing procedure
Generic framing procedureGeneric framing procedure
Generic framing procedure
 
Partisi harddisk
Partisi harddiskPartisi harddisk
Partisi harddisk
 
MATERI ROUTING STATIS (2).pptx
MATERI ROUTING STATIS (2).pptxMATERI ROUTING STATIS (2).pptx
MATERI ROUTING STATIS (2).pptx
 
Sister 011 - network file system
Sister   011 - network file systemSister   011 - network file system
Sister 011 - network file system
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Optical Transport Network
Optical Transport NetworkOptical Transport Network
Optical Transport Network
 
Optical Transport Network (OTN) Tutorial
Optical Transport Network (OTN) TutorialOptical Transport Network (OTN) Tutorial
Optical Transport Network (OTN) Tutorial
 
BGP filter with mikrotik
BGP filter with mikrotikBGP filter with mikrotik
BGP filter with mikrotik
 
Tutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlowTutorial on SDN and OpenFlow
Tutorial on SDN and OpenFlow
 
Mpls concepts. Time to Certify
Mpls concepts. Time to CertifyMpls concepts. Time to Certify
Mpls concepts. Time to Certify
 
Cloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPFCloud Native Networking & Security with Cilium & eBPF
Cloud Native Networking & Security with Cilium & eBPF
 
RPP - Administrasi Infrastruktur Jaringan | Kelas XI
RPP - Administrasi Infrastruktur Jaringan | Kelas XIRPP - Administrasi Infrastruktur Jaringan | Kelas XI
RPP - Administrasi Infrastruktur Jaringan | Kelas XI
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappNetwork Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
Ftp
FtpFtp
Ftp
 

En vedette

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology pptAkshay K Sajan
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan variaMilan Varia
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOSfpatton
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System OverviewMadhu Bala
 
Deep learning intro
Deep learning introDeep learning intro
Deep learning introbeamandrew
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introductionrushmila
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationSandeep Sharma
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum ComputersDeepti.B
 

En vedette (20)

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
You Know WebOS
You Know WebOSYou Know WebOS
You Know WebOS
 
webOS Introduction
webOS IntroductionwebOS Introduction
webOS Introduction
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOS
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System Overview
 
Deep learning intro
Deep learning introDeep learning intro
Deep learning intro
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentation
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 

Similaire à Bit Torrent Technology

Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4raeshu
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology Parth Akbari
 

Similaire à Bit Torrent Technology (20)

Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Bit Torrent Technology

  • 1. Bit torrent Technology Done by: Swathi Raman 08D2754
  • 2. BitTorrent Bram Cohen is the creator of BitTorrent, one of the most successful peer-to-peer programs ever. BitTorrent is a protocol (a set of rules that different computer systems agree to use) based on P2P that can be used to share large files very efficiently, using minimum bandwidth. It is just a tool used to download, it does not contain a built-in search facility. The .torrent files are usually located via HTTP thru search engines and trackers.
  • 3. Torrent Lingo Torrent – At the beginning of all this is the torrent file itself. The .torrent file is not the entire file. It is extremely small and it just contains the information that points to the actual file and the people who are sharing it. It is like a map which is used by the BitTorrent client to assemble all the pieces together. BitTorrent client – A Bit Torrent client is one of the most important parts of the torrent process. It is a piece of software which takes the .torrent file, reads the information in it and starts the download. Peer - A peer is any computer participating in the download and upload of a torrent file.
  • 4. (contd..) Seeder - A seed (or seeder) is anyone who has a complete copy of the file being shared across the torrent network. Leecher - A leech (or a leecher) is the person who does not have the complete file yet but has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network. Share ratio – The ratio is the amount of data a user has uploaded divided by the amount of data they have downloaded for a particular torrent (UL÷DL). A share ratio of 1+ has a positive effect on the user’s reputation because it means that the user has sent more data to other users than he has received. Conversely, share ratios under 1 have a negative effect.
  • 5. (contd..) Swarm – The swarm is the sum total of all the leechers and seeders (i.e. all the computers) participating in the torrent process. Tracker – The tracker is a server which has the information of who has what files and who needs which ones, thus acting as a bridge between seeders and leechers. Some trackers are private requiring a registration where most are public. Index – An index is, as the name implies, a searchable list of .torrent files, hosted on a website.
  • 6. Traditional Client-server downloading Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients. It works like this: - You open a Web page and click a link to download a file to your computer. - The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer. - The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (Hypertext Transfer Protocol).
  • 7.
  • 8. Drawbacks Traffic congestion on the network has been an issue since the inception of the client-server paradigm. As the number of simultaneous client requests to a given server increases, the server can become overloaded. The client-server paradigm lacks the robustness of a good P2P network. Under client-server, should a critical server fail, clients’ requests cannot be fulfilled. In P2P networks, resources are usually distributed among many nodes.
  • 9. The BitTorrent Protocol Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. BitTorrent is a peer-to-peer file sharing protocol allowing users to distribute large amounts of data without putting the level of strain on their computers that would be needed for standard Internet hosting. The protocol works as an alternative data distribution method that makes even small computers with low bandwidth capable of participating in large data transfers.
  • 10. COMPONENTS OF THE PROTOCOL Metainfo file- Describes metadata about the sharing file(s), and the tracker, and has the file ending .torrent. Tracker- A central server keeping track of peers and seeds sharing and downloading the file(s). Peer- A user on the network downloading the file(s), and sharing the parts that have been successfully downloaded. Seed- A peer that has the complete file or files available for sharing. At least one seed is needed in the beginning for the sharing to be possible. Client.-An application implementing the BitTorrent protocol.
  • 11. Operation You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file and those with a portion of the file. The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer.
  • 12.
  • 13. (contd..) Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file.
  • 14. Advantages BitTorrent is an open-source program offers a spyware- and nuisance-free installation.  Allows users to share large amounts of data in a short span of time. Discourages “freeloading” by rewarding fastest uploaders. BitTorrent requires that users share files back with the community, so no one can get files without also giving files — this level of reciprocity makes the system stronger and faster. The more popular a file is — the more people want a copy of it — the faster it can be downloaded, because there are more places to get pieces of it.
  • 15. (Contd..) Does not require high technical knowledge to use the BitTorrent- an average person needs not a user guide . By downloading a fraction of the file (1/10th) from ten to fifteen computers at the same time, the file is downloaded much faster. BitTorrent enables distributors to share the distribution load with all the people who get a copy of it, reducing the bandwidth burden on the distributor.
  • 16. Limitations Lack of anonymity- BitTorrent does not offer its users anonymity. The leech problem- A BitTorrent user may often choose to leave the swarm as soon as they have a complete copy of the file they are downloading. The cheater problem- There are "cheating" clients like BitThief which claim to be able to download without uploading. Speed- Average BitTorrent download speed is limited by the combined average upload speed of "peers" (other nodes with partial copies which are also downloading) and "seeds" (complete copies that are only uploading).