SlideShare une entreprise Scribd logo
1  sur  32
Join the swarm!
PRASHANTH S
1CR11EC076
 Peer to peer
 More users, better it is
 Large amounts of data transfer
 Encourages peers to upload
 > a quarter of a billion monthly users*
 Client-server architecture
 Conventional method used for years
 Direct connection between server & client
 Large no. of dedicated servers
 Download data at high speeds
 Reach high transfer rates very quickly
 No loss of files once uploaded
 File availability does not depend on popularity
 Single point of failure
 Maintenance of servers
 Servers require large bandwidth
 Website crash eg: VTU website
 Decentralized communications model
 Nodes(peers) are interconnected
 Content not on a central server
 Content present on peer’s computer
 No need of server for data transfer
 Peers->provide and consume resources
 Designed as P2P MP3 sharing service
 Song downloaded from other peer
 Server only used to connect peers
 Redefined the internet
 Peers run Napster utility
 Central Index Server(CIS)
 Peers connect to CIS
 Peers inform CIS about files on their directory
 When the user wants a file, he queries the CIS
 CIS directs them to the computer that has it
 Connection is established between peers
 Transfer is initiated
 Transfer takes place from a single source
 Speed limited to upload capacity of source
 Requires only a subset of users to share
 Encourage free-riding
 Exerts too much load on original sources
 Napster was shutdown in its original form
 No CIS like the one used in Napster
 Made use of FastTrack protocol
 Super nodes and ordinary nodes
 1 super node serves 60 to 150 ordinary nodes
 Software comes with a list of super nodes
 The client connects to one of the super nodes
 A file request in passed through super node
 Super node passes the query super nodes
 The other super nodes pass it to ordinary nodes
 The ordinary nodes ask other ordinary nodes
 7 levels deep
 If a file is found, transfer takes place
 Super nodes do not take part in the transfer
 Super node has to handle lot of traffic
 Transfer happens between only 2 peers
 Bandwidth available to receiver not utilised
 Encourages free-riding
Similarities with Napster:
 Users share their files with everyone else
 Users run a software to connect to network
Differences with Napster:
 No central database like Napster
 Machines inform other machines about files
 Achieved using distributed query approach
 User types in the name of the required file
 This machine requests other known machines
 These machines search their directory
 If not found, forward the request
 This process may go 7 levels deep
 A single search may cover 8000 machines
 The 8000 machines may not contain the file
 Takes time for search results to appear
 Bandwidth to handle requests from other users
 Bandwidth available to receiver not utilised
 Seeder
 Seeder
 Leecher
 Seeder
 Leecher
 Torrent file
 Seeder
 Leecher
 Torrent file
 Swarm
 Seeder
 Leecher
 Torrent file
 Swarm
 Tracker
 Create a torrent
◦ Select files
◦ Choose a tracker
◦ Select saving directory
◦ Select piece size(better left untouched)
◦ Start seeding!!
 Downloading files
◦ Download torrent file
◦ Client software communicates with a tracker to find
 Other computers that have the complete file (seeds)
 Those with a portion of the file
◦ Peers communicate with each other
◦ Download/upload starts from/to different peers
 .torrent file
◦ Metadata about the required file
 The URL of the tracker
 Pieces <hash1, hash 2,…, hash n>
 Piece length
 Name of the file
 Length of the file
 Tit for tat approach
 Optimistic unchoking
 Random first piece
 Rarest first
 Endgame mode
 Pollution attack
 Bandwidth shaping
 Open source
 Share large amount of data quickly
 Discourages free-riding
 More users, the better it is
 Download takes place from multiple locations
 Reduces burden on original distributors
 Easy to download expensive software, movies
 Organisations distribute legitimate software
 Leechers may leave swarm after download
 Unpopular content has no seeds
 Takes time to reach high download speeds
 No streaming playback
Evolution and working of Torrents

Contenu connexe

Tendances

Neural Networks and Deep Learning Basics
Neural Networks and Deep Learning BasicsNeural Networks and Deep Learning Basics
Neural Networks and Deep Learning BasicsJon Lederman
 
مدیریت رخداد چیست؟ What is incident Management?
مدیریت رخداد چیست؟ What is incident Management?مدیریت رخداد چیست؟ What is incident Management?
مدیریت رخداد چیست؟ What is incident Management?Kaveh Radi
 
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPES
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPESFUNDAMENTALS OF MACHINE LEARNING & IT’S TYPES
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPESBhimsen Joshi
 
Deep Belief nets
Deep Belief netsDeep Belief nets
Deep Belief netsbutest
 
Noise filtering
Noise filteringNoise filtering
Noise filteringAlaa Ahmed
 
Spring 3.1에서 ehcache 활용 전략
Spring 3.1에서 ehcache 활용 전략Spring 3.1에서 ehcache 활용 전략
Spring 3.1에서 ehcache 활용 전략흥래 김
 
Learning Methods in a Neural Network
Learning Methods in a Neural NetworkLearning Methods in a Neural Network
Learning Methods in a Neural NetworkSaransh Choudhary
 
NetVLAD: CNN architecture for weakly supervised place recognition
NetVLAD:  CNN architecture for weakly supervised place recognitionNetVLAD:  CNN architecture for weakly supervised place recognition
NetVLAD: CNN architecture for weakly supervised place recognitionGeunhee Cho
 
Fault Detection using Python
Fault Detection using PythonFault Detection using Python
Fault Detection using PythonRishabh Garg
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsManish Khare
 
Semi supervised learning machine learning made simple
Semi supervised learning  machine learning made simpleSemi supervised learning  machine learning made simple
Semi supervised learning machine learning made simpleDevansh16
 
Employee Management System in C++
Employee Management System in C++Employee Management System in C++
Employee Management System in C++Jayant Gope
 
Real Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewReal Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewSpringer
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slidesmahavir_a
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocolAviran Mordo
 

Tendances (20)

Neural Networks and Deep Learning Basics
Neural Networks and Deep Learning BasicsNeural Networks and Deep Learning Basics
Neural Networks and Deep Learning Basics
 
15CS562 AI VTU Question paper
15CS562 AI VTU Question paper15CS562 AI VTU Question paper
15CS562 AI VTU Question paper
 
Learning With Complete Data
Learning With Complete DataLearning With Complete Data
Learning With Complete Data
 
Bus Pass.pptx
Bus Pass.pptxBus Pass.pptx
Bus Pass.pptx
 
مدیریت رخداد چیست؟ What is incident Management?
مدیریت رخداد چیست؟ What is incident Management?مدیریت رخداد چیست؟ What is incident Management?
مدیریت رخداد چیست؟ What is incident Management?
 
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPES
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPESFUNDAMENTALS OF MACHINE LEARNING & IT’S TYPES
FUNDAMENTALS OF MACHINE LEARNING & IT’S TYPES
 
Deep Belief nets
Deep Belief netsDeep Belief nets
Deep Belief nets
 
Noise filtering
Noise filteringNoise filtering
Noise filtering
 
Spring 3.1에서 ehcache 활용 전략
Spring 3.1에서 ehcache 활용 전략Spring 3.1에서 ehcache 활용 전략
Spring 3.1에서 ehcache 활용 전략
 
Learning Methods in a Neural Network
Learning Methods in a Neural NetworkLearning Methods in a Neural Network
Learning Methods in a Neural Network
 
NetVLAD: CNN architecture for weakly supervised place recognition
NetVLAD:  CNN architecture for weakly supervised place recognitionNetVLAD:  CNN architecture for weakly supervised place recognition
NetVLAD: CNN architecture for weakly supervised place recognition
 
Session tracking In Java
Session tracking In JavaSession tracking In Java
Session tracking In Java
 
Fault Detection using Python
Fault Detection using PythonFault Detection using Python
Fault Detection using Python
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objects
 
Semi supervised learning machine learning made simple
Semi supervised learning  machine learning made simpleSemi supervised learning  machine learning made simple
Semi supervised learning machine learning made simple
 
Employee Management System in C++
Employee Management System in C++Employee Management System in C++
Employee Management System in C++
 
SIH 2023 pptx.pptx
SIH 2023 pptx.pptxSIH 2023 pptx.pptx
SIH 2023 pptx.pptx
 
Real Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A ReviewReal Time Object Detection System with YOLO and CNN Models: A Review
Real Time Object Detection System with YOLO and CNN Models: A Review
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slides
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
 

Similaire à Evolution and working of Torrents

Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networkssanjoysanyal
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications905426
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachersAbdealiVankanerwala
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed SystemsDilum Bandara
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocolNishan Shetty
 

Similaire à Evolution and working of Torrents (20)

Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems02 - Topologies of Distributed Systems
02 - Topologies of Distributed Systems
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Types of servers
Types of serversTypes of servers
Types of servers
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Evolution and working of Torrents

  • 2.  Peer to peer  More users, better it is  Large amounts of data transfer  Encourages peers to upload  > a quarter of a billion monthly users*
  • 3.  Client-server architecture  Conventional method used for years  Direct connection between server & client  Large no. of dedicated servers
  • 4.  Download data at high speeds  Reach high transfer rates very quickly  No loss of files once uploaded  File availability does not depend on popularity
  • 5.  Single point of failure  Maintenance of servers  Servers require large bandwidth  Website crash eg: VTU website
  • 6.  Decentralized communications model  Nodes(peers) are interconnected  Content not on a central server  Content present on peer’s computer  No need of server for data transfer  Peers->provide and consume resources
  • 7.  Designed as P2P MP3 sharing service  Song downloaded from other peer  Server only used to connect peers  Redefined the internet
  • 8.  Peers run Napster utility  Central Index Server(CIS)  Peers connect to CIS  Peers inform CIS about files on their directory  When the user wants a file, he queries the CIS  CIS directs them to the computer that has it  Connection is established between peers  Transfer is initiated
  • 9.
  • 10.  Transfer takes place from a single source  Speed limited to upload capacity of source  Requires only a subset of users to share  Encourage free-riding  Exerts too much load on original sources  Napster was shutdown in its original form
  • 11.  No CIS like the one used in Napster  Made use of FastTrack protocol  Super nodes and ordinary nodes  1 super node serves 60 to 150 ordinary nodes
  • 12.  Software comes with a list of super nodes  The client connects to one of the super nodes  A file request in passed through super node  Super node passes the query super nodes  The other super nodes pass it to ordinary nodes  The ordinary nodes ask other ordinary nodes  7 levels deep  If a file is found, transfer takes place  Super nodes do not take part in the transfer
  • 13.
  • 14.
  • 15.  Super node has to handle lot of traffic  Transfer happens between only 2 peers  Bandwidth available to receiver not utilised  Encourages free-riding
  • 16. Similarities with Napster:  Users share their files with everyone else  Users run a software to connect to network Differences with Napster:  No central database like Napster  Machines inform other machines about files  Achieved using distributed query approach
  • 17.  User types in the name of the required file  This machine requests other known machines  These machines search their directory  If not found, forward the request  This process may go 7 levels deep  A single search may cover 8000 machines
  • 18.
  • 19.  The 8000 machines may not contain the file  Takes time for search results to appear  Bandwidth to handle requests from other users  Bandwidth available to receiver not utilised
  • 23.  Seeder  Leecher  Torrent file  Swarm
  • 24.  Seeder  Leecher  Torrent file  Swarm  Tracker
  • 25.  Create a torrent ◦ Select files ◦ Choose a tracker ◦ Select saving directory ◦ Select piece size(better left untouched) ◦ Start seeding!!
  • 26.  Downloading files ◦ Download torrent file ◦ Client software communicates with a tracker to find  Other computers that have the complete file (seeds)  Those with a portion of the file ◦ Peers communicate with each other ◦ Download/upload starts from/to different peers
  • 27.  .torrent file ◦ Metadata about the required file  The URL of the tracker  Pieces <hash1, hash 2,…, hash n>  Piece length  Name of the file  Length of the file
  • 28.  Tit for tat approach  Optimistic unchoking  Random first piece  Rarest first  Endgame mode
  • 29.  Pollution attack  Bandwidth shaping
  • 30.  Open source  Share large amount of data quickly  Discourages free-riding  More users, the better it is  Download takes place from multiple locations  Reduces burden on original distributors  Easy to download expensive software, movies  Organisations distribute legitimate software
  • 31.  Leechers may leave swarm after download  Unpopular content has no seeds  Takes time to reach high download speeds  No streaming playback