SlideShare une entreprise Scribd logo
1  sur  17
Bit torrent Technology Done by: Swathi Raman 08D2754
BitTorrent Bram Cohen is the creator of BitTorrent, one of the most successful peer-to-peer programs ever.  BitTorrent is a protocol (a set of rules that different computer systems agree to use) based on P2P that can be used to share large files very efficiently, using minimum bandwidth. It is just a tool used to download, it does not contain a built-in search facility. The .torrent files are usually located via HTTP thru search engines and trackers.
Torrent Lingo Torrent – At the beginning of all this is the torrent file itself. The .torrent file is not the entire file. It is extremely small and it just contains the information that points to the actual file and the people who are sharing it. It is like a map which is used by the BitTorrent client to assemble all the pieces together. BitTorrent client – A Bit Torrent client is one of the most important parts of the torrent process. It is a piece of software which takes the .torrent file, reads the information in it and starts the download. Peer - A peer is any computer participating in the download and upload of a torrent file.
(contd..) Seeder - A seed (or seeder) is anyone who has a complete copy of the file being shared across the torrent network. Leecher - A leech (or a leecher) is the person who does not have the complete file yet but has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network. Share ratio – The ratio is the amount of data a user has uploaded divided by the amount of data they have downloaded for a particular torrent (UL÷DL). A share ratio of 1+ has a positive effect on the user’s reputation because it means that the user has sent more data to other users than he has received. Conversely, share ratios under 1 have a negative effect.
(contd..) Swarm – The swarm is the sum total of all the leechers and seeders (i.e. all the computers) participating in the torrent process. Tracker – The tracker is a server which has the information of who has what files and who needs which ones, thus acting as a bridge between seeders and leechers. Some trackers are private requiring a registration where most are public. Index – An index is, as the name implies, a searchable list of .torrent files, hosted on a website.
Traditional Client-server downloading Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients. It works like this:                    - You open a Web page and click a link to download a file      to your computer.                     - The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer.                     - The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (Hypertext Transfer Protocol).
Drawbacks Traffic congestion on the network has been an issue since the inception of the client-server paradigm. As the number of simultaneous client requests to a given server increases, the server can become overloaded.  The client-server paradigm lacks the robustness of a good P2P network. Under client-server, should a critical server fail, clients’ requests cannot be fulfilled. In P2P networks, resources are usually distributed among many nodes.
The BitTorrent Protocol Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. BitTorrent is a peer-to-peer file sharing protocol allowing users to distribute large amounts of data without putting the level of strain on their computers that would be needed for standard Internet hosting. The protocol works as an alternative data distribution method that makes even small computers with low bandwidth capable of participating in large data transfers.
COMPONENTS OF THE PROTOCOL Metainfo file- Describes metadata about the sharing file(s), and the tracker, and has the file ending .torrent.  Tracker- A central server keeping track of peers and seeds sharing and downloading the file(s). Peer- A user on the network downloading the file(s), and sharing the parts that have been successfully downloaded. Seed- A peer that has the complete file or files available for sharing. At least one seed is needed in the beginning for the sharing to be possible. Client.-An application implementing the BitTorrent protocol.
Operation You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file and those with a portion of the file. The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer.
(contd..) Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download.  By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file.
Advantages BitTorrent is an open-source program offers a spyware- and nuisance-free installation.  Allows users to share large amounts of data in a short span of time. Discourages “freeloading” by rewarding fastest uploaders. BitTorrent requires that users share files back with the community, so no one can get files without also giving files — this level of reciprocity makes the system stronger and faster. The more popular a file is — the more people want a copy of it — the faster it can be downloaded, because there are more places to get pieces of it.
(Contd..) Does not require high technical knowledge to use  the BitTorrent- an average person needs not a user guide . By downloading a fraction of the file (1/10th) from ten to fifteen computers at the same time, the file is downloaded much faster. BitTorrent enables distributors to share the distribution load with all the people who get a copy of it, reducing the bandwidth burden on the distributor.
Limitations Lack of anonymity- BitTorrent does not offer its users anonymity.  The leech problem- A BitTorrent user may often choose to leave the swarm as soon as they have a complete copy of the file they are downloading.  The cheater problem- There are "cheating" clients like BitThief which claim to be able to download without uploading.  Speed- Average BitTorrent download speed is limited by the combined average upload speed of "peers" (other nodes with partial copies which are also downloading) and "seeds" (complete copies that are only uploading).
THANK YOU

Contenu connexe

Tendances (20)

Congestion control
Congestion controlCongestion control
Congestion control
 
Cent-OS - Sistema Operacional
Cent-OS - Sistema OperacionalCent-OS - Sistema Operacional
Cent-OS - Sistema Operacional
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Linux Network Management
Linux Network ManagementLinux Network Management
Linux Network Management
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
HTTPS
HTTPSHTTPS
HTTPS
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
Content Delivery Networks (CDN)
Content Delivery Networks (CDN)Content Delivery Networks (CDN)
Content Delivery Networks (CDN)
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 

En vedette

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan variaMilan Varia
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOSfpatton
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System OverviewMadhu Bala
 
Deep learning intro
Deep learning introDeep learning intro
Deep learning introbeamandrew
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introductionrushmila
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationSandeep Sharma
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum ComputersDeepti.B
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation7thingsmedia
 
Augmented Reality using Microsoft Hololens
Augmented Reality using Microsoft HololensAugmented Reality using Microsoft Hololens
Augmented Reality using Microsoft HololensKishan Kumar
 

En vedette (20)

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
You Know WebOS
You Know WebOSYou Know WebOS
You Know WebOS
 
webOS Introduction
webOS IntroductionwebOS Introduction
webOS Introduction
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Intro To webOS
Intro To webOSIntro To webOS
Intro To webOS
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Web Operating System Overview
Web Operating System OverviewWeb Operating System Overview
Web Operating System Overview
 
Deep learning intro
Deep learning introDeep learning intro
Deep learning intro
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Google seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentationGoogle seo-search-engine-optimization-introduction-powerpoint-presentation
Google seo-search-engine-optimization-introduction-powerpoint-presentation
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Introduction to SEO Presentation
Introduction to SEO PresentationIntroduction to SEO Presentation
Introduction to SEO Presentation
 
Augmented Reality using Microsoft Hololens
Augmented Reality using Microsoft HololensAugmented Reality using Microsoft Hololens
Augmented Reality using Microsoft Hololens
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 

Similaire à Bit Torrent Technology

Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4raeshu
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachersAbdealiVankanerwala
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 

Similaire à Bit Torrent Technology (20)

Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bit Torrent Technology

  • 1. Bit torrent Technology Done by: Swathi Raman 08D2754
  • 2. BitTorrent Bram Cohen is the creator of BitTorrent, one of the most successful peer-to-peer programs ever. BitTorrent is a protocol (a set of rules that different computer systems agree to use) based on P2P that can be used to share large files very efficiently, using minimum bandwidth. It is just a tool used to download, it does not contain a built-in search facility. The .torrent files are usually located via HTTP thru search engines and trackers.
  • 3. Torrent Lingo Torrent – At the beginning of all this is the torrent file itself. The .torrent file is not the entire file. It is extremely small and it just contains the information that points to the actual file and the people who are sharing it. It is like a map which is used by the BitTorrent client to assemble all the pieces together. BitTorrent client – A Bit Torrent client is one of the most important parts of the torrent process. It is a piece of software which takes the .torrent file, reads the information in it and starts the download. Peer - A peer is any computer participating in the download and upload of a torrent file.
  • 4. (contd..) Seeder - A seed (or seeder) is anyone who has a complete copy of the file being shared across the torrent network. Leecher - A leech (or a leecher) is the person who does not have the complete file yet but has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network. Share ratio – The ratio is the amount of data a user has uploaded divided by the amount of data they have downloaded for a particular torrent (UL÷DL). A share ratio of 1+ has a positive effect on the user’s reputation because it means that the user has sent more data to other users than he has received. Conversely, share ratios under 1 have a negative effect.
  • 5. (contd..) Swarm – The swarm is the sum total of all the leechers and seeders (i.e. all the computers) participating in the torrent process. Tracker – The tracker is a server which has the information of who has what files and who needs which ones, thus acting as a bridge between seeders and leechers. Some trackers are private requiring a registration where most are public. Index – An index is, as the name implies, a searchable list of .torrent files, hosted on a website.
  • 6. Traditional Client-server downloading Client-server computing or networking is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients. It works like this: - You open a Web page and click a link to download a file to your computer. - The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer. - The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (Hypertext Transfer Protocol).
  • 7.
  • 8. Drawbacks Traffic congestion on the network has been an issue since the inception of the client-server paradigm. As the number of simultaneous client requests to a given server increases, the server can become overloaded. The client-server paradigm lacks the robustness of a good P2P network. Under client-server, should a critical server fail, clients’ requests cannot be fulfilled. In P2P networks, resources are usually distributed among many nodes.
  • 9. The BitTorrent Protocol Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. BitTorrent is a peer-to-peer file sharing protocol allowing users to distribute large amounts of data without putting the level of strain on their computers that would be needed for standard Internet hosting. The protocol works as an alternative data distribution method that makes even small computers with low bandwidth capable of participating in large data transfers.
  • 10. COMPONENTS OF THE PROTOCOL Metainfo file- Describes metadata about the sharing file(s), and the tracker, and has the file ending .torrent. Tracker- A central server keeping track of peers and seeds sharing and downloading the file(s). Peer- A user on the network downloading the file(s), and sharing the parts that have been successfully downloaded. Seed- A peer that has the complete file or files available for sharing. At least one seed is needed in the beginning for the sharing to be possible. Client.-An application implementing the BitTorrent protocol.
  • 11. Operation You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file and those with a portion of the file. The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer.
  • 12.
  • 13. (contd..) Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file.
  • 14. Advantages BitTorrent is an open-source program offers a spyware- and nuisance-free installation.  Allows users to share large amounts of data in a short span of time. Discourages “freeloading” by rewarding fastest uploaders. BitTorrent requires that users share files back with the community, so no one can get files without also giving files — this level of reciprocity makes the system stronger and faster. The more popular a file is — the more people want a copy of it — the faster it can be downloaded, because there are more places to get pieces of it.
  • 15. (Contd..) Does not require high technical knowledge to use the BitTorrent- an average person needs not a user guide . By downloading a fraction of the file (1/10th) from ten to fifteen computers at the same time, the file is downloaded much faster. BitTorrent enables distributors to share the distribution load with all the people who get a copy of it, reducing the bandwidth burden on the distributor.
  • 16. Limitations Lack of anonymity- BitTorrent does not offer its users anonymity. The leech problem- A BitTorrent user may often choose to leave the swarm as soon as they have a complete copy of the file they are downloading. The cheater problem- There are "cheating" clients like BitThief which claim to be able to download without uploading. Speed- Average BitTorrent download speed is limited by the combined average upload speed of "peers" (other nodes with partial copies which are also downloading) and "seeds" (complete copies that are only uploading).