SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
S ‘O’ A UNIVERSITY BHUBANESWAR
Decentralizing Servers:
Torrents
23:28 DEPARTMENTOF CA: ITER 1
Submitted By:
Biswas Prasana Swain
2261020289
3rd Sem, MCA
Guided By:
Mr. Prasanta Ku. Sahoo
Sr. Professor
Dept. Of CA
S ‘O’ A UNIVERSITY BHUBANESWAR
What we will learn?
What is
Decentralization?
What is Torrenting?
How Does Torrenting
Work?
What Are the
Benefits of
Torrenting?
What Are the
Challenges of
Torrenting?
How Can You Torrent
Safely and
Responsibly?
Conclusion References
23:28 DEPARTMENTOF CA: ITER 2
S ‘O’ A UNIVERSITY BHUBANESWAR
Decentralization means the transfer of power, authority, control, and decision-making away
from a central, authoritative location or group and given to smaller factions within it.
For example, in a centralized system, one person or organization makes all the rules and
decisions for everyone else. In a decentralized system, different people or groups can make
their own rules and decisions based on their needs and preferences.
Decentralization can happen in different areas, such as politics, administration, economy,
and technology.
23:28 DEPARTMENTOF CA: ITER 3
What is Decentralization?
S ‘O’ A UNIVERSITY BHUBANESWAR
Torrenting is a way of sharing files
over the internet using a technology
called BitTorrent.
BitTorrent is a peer-to-peer (P2P) file-
sharing protocol, which means that it
allows users to transfer data and files
directly to each other without using a
central server.
A torrentis a small file that contains
information about the files that you
wantto download, such as their
names, sizes, locations, and
cryptographic hashes. You need a
special programcalled a torrentclient
to open and usetorrents.
23:28 DEPARTMENTOF CA: ITER 4
What is Torrenting?
S ‘O’ A UNIVERSITY BHUBANESWAR
When you want to download a file using torrenting, you first need to find and download a torrent
file that matches what you are looking for. You can use websites called torrent sites to search for
torrents.
Then, you open the torrent file with your torrent client. The torrent client will contact a server
called a tracker, which will tell it how to connect to other users who have the same or parts of the
same file. These users are called peers or seeders.
The torrent client will then download smallpieces of the file from different peers or seeders until it
has the complete file. At the same time, it will also upload the pieces that it has to other peers who
need them. This way, everyone helps each other to share the file faster and more efficiently.
23:28 DEPARTMENTOF CA: ITER 5
How does Torrenting work?
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 6
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 7
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENT OF CA: ITER 8
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 9
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 10
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 11
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 12
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 13
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 14
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 15
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 16
What Are the Benefits of Torrenting?
Itcan reducethe costand burden
on the original sourceof the file,
since it does not haveto provide
the file to every user who requests
it.
Itcan increasethe speed and
availability of the file, sinceit does
not depend on a single server or
connection. As long as there are
enough peers or seeders in the
network, the file can be
downloaded by anyone.
Itcan allow users to access and
distributeany type of file, including
large or rarefiles that may not be
easily found or hosted elsewhere.
S ‘O’ A UNIVERSITY BHUBANESWAR
Itcan exposeyou to legal issues if you
download or sharefiles that are
protected by copyrightlaws or
contain illegal content. You may face
fines, lawsuits, or even criminal
charges if you arecaught by
authorities or rights holders.
Itcan exposeyou to security issues if
you download or sharefiles that are
infected with malwareor contain
harmfulcontent. You may damage
your device, compromiseyour data,
or lose your privacy if you arenot
carefulabout whatyou download or
who you trust.
Itcan exposeyou to performance
issues if you download or sharetoo
many files at once or use an
unreliable torrentclient. You may
experience slow speeds, connection
problems, or device crashes if you do
not manage your bandwidth or
resources properly.
23:28 DEPARTMENTOF CA: ITER 17
What Are the Challenges of Torrenting?
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 18
How Can You Torrent Safely and
Responsibly??
Onlydownloadtorrentsfrom
reputable websites,confirmingthe
legitimacyof the torrentsyou’re
using,usingagood P2P client,
avoidingcopyrighted material,and
gettinga VPN.
A VPN isa service thatencryptsyour
internettrafficandhidesyourIP
addressfromothers.Thiscan help
youprotect youridentityandactivity
fromyour internetserviceprovider
(ISP),authorities,rightsholders,
hackers,andother maliciousactors.
A VPN can alsohelpyouaccess
blockedorrestrictedtorrentsites
and contentinyourregionby
changingyourvirtual locationto
anothercountrywhere theyare
available.
S ‘O’ A UNIVERSITY BHUBANESWAR
In this presentation, we
learned about
decentralisation and
torrenting.
We learned what they
are, how they work,
what are their benefits
and challenges, and how
to use them safely and
responsibly.
23:28 DEPARTMENTOF CA: ITER 19
Conclusion
S ‘O’ A UNIVERSITY BHUBANESWAR
Cohen, B. (2003). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems (Vol. 6, pp. 68-72).
Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., ... & Sips, H. (2005). Tribler: A social-based peer-to-peer system. In 5th
InternationalWorkshop on Peer-to-Peer Systems(IPTPS) (Vol. 2006).
Cohen, B. (2008). TheBitTorrentprotocolspecification.
Cohen, B., & Loewenstein, J. (2010). BitTorrentlive: A low-latency live P2P video streaming system. In Proceedings of the2010 ACMworkshop
on Peer-to-peer streaming and IP-TV (pp. 127-132).
Cohen, B., & Shen, R. (2012). Torrents of tweets: A study of the twitter backbone. In Proceedings of the 2012 ACMworkshop on Workshop on
online socialnetworks (pp. 41-46).
Cohen, B., & Shen, R. (2013). Academic torrents: Scalabledata distribution for research. In Proceedings of the2013 IEEE/ACM International
Conferenceon Advances in Social Networks Analysis and Mining (pp. 1449-1450).
https://torrentfreak.com/academics-launch-torrent-site-to-share-papers-and-datasets-140131/.
23:28 DEPARTMENTOF CA: ITER 20
References
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 21
Thank You!
Any Questions?

Weitere ähnliche Inhalte

Ähnlich wie Dencentralizing Servers - Torrents.pdf

Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageProQSys
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)geeksec80
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdfSamuel Medeludo
 
What are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfWhat are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfMark Tencaten
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Securityijceronline
 
Net Neutrality by Suhail Attar
Net Neutrality by Suhail AttarNet Neutrality by Suhail Attar
Net Neutrality by Suhail AttarSuhail Attar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using SnortRick Wanner
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...eby
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 

Ähnlich wie Dencentralizing Servers - Torrents.pdf (20)

Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdf
 
What are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfWhat are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdf
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
 
Net neutrality
Net neutrality Net neutrality
Net neutrality
 
Net Neutrality by Suhail Attar
Net Neutrality by Suhail AttarNet Neutrality by Suhail Attar
Net Neutrality by Suhail Attar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 

Kürzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Dencentralizing Servers - Torrents.pdf

  • 1. S ‘O’ A UNIVERSITY BHUBANESWAR Decentralizing Servers: Torrents 23:28 DEPARTMENTOF CA: ITER 1 Submitted By: Biswas Prasana Swain 2261020289 3rd Sem, MCA Guided By: Mr. Prasanta Ku. Sahoo Sr. Professor Dept. Of CA
  • 2. S ‘O’ A UNIVERSITY BHUBANESWAR What we will learn? What is Decentralization? What is Torrenting? How Does Torrenting Work? What Are the Benefits of Torrenting? What Are the Challenges of Torrenting? How Can You Torrent Safely and Responsibly? Conclusion References 23:28 DEPARTMENTOF CA: ITER 2
  • 3. S ‘O’ A UNIVERSITY BHUBANESWAR Decentralization means the transfer of power, authority, control, and decision-making away from a central, authoritative location or group and given to smaller factions within it. For example, in a centralized system, one person or organization makes all the rules and decisions for everyone else. In a decentralized system, different people or groups can make their own rules and decisions based on their needs and preferences. Decentralization can happen in different areas, such as politics, administration, economy, and technology. 23:28 DEPARTMENTOF CA: ITER 3 What is Decentralization?
  • 4. S ‘O’ A UNIVERSITY BHUBANESWAR Torrenting is a way of sharing files over the internet using a technology called BitTorrent. BitTorrent is a peer-to-peer (P2P) file- sharing protocol, which means that it allows users to transfer data and files directly to each other without using a central server. A torrentis a small file that contains information about the files that you wantto download, such as their names, sizes, locations, and cryptographic hashes. You need a special programcalled a torrentclient to open and usetorrents. 23:28 DEPARTMENTOF CA: ITER 4 What is Torrenting?
  • 5. S ‘O’ A UNIVERSITY BHUBANESWAR When you want to download a file using torrenting, you first need to find and download a torrent file that matches what you are looking for. You can use websites called torrent sites to search for torrents. Then, you open the torrent file with your torrent client. The torrent client will contact a server called a tracker, which will tell it how to connect to other users who have the same or parts of the same file. These users are called peers or seeders. The torrent client will then download smallpieces of the file from different peers or seeders until it has the complete file. At the same time, it will also upload the pieces that it has to other peers who need them. This way, everyone helps each other to share the file faster and more efficiently. 23:28 DEPARTMENTOF CA: ITER 5 How does Torrenting work?
  • 6. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 6
  • 7. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 7
  • 8. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENT OF CA: ITER 8
  • 9. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 9
  • 10. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 10
  • 11. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 11
  • 12. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 12
  • 13. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 13
  • 14. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 14
  • 15. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 15
  • 16. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 16 What Are the Benefits of Torrenting? Itcan reducethe costand burden on the original sourceof the file, since it does not haveto provide the file to every user who requests it. Itcan increasethe speed and availability of the file, sinceit does not depend on a single server or connection. As long as there are enough peers or seeders in the network, the file can be downloaded by anyone. Itcan allow users to access and distributeany type of file, including large or rarefiles that may not be easily found or hosted elsewhere.
  • 17. S ‘O’ A UNIVERSITY BHUBANESWAR Itcan exposeyou to legal issues if you download or sharefiles that are protected by copyrightlaws or contain illegal content. You may face fines, lawsuits, or even criminal charges if you arecaught by authorities or rights holders. Itcan exposeyou to security issues if you download or sharefiles that are infected with malwareor contain harmfulcontent. You may damage your device, compromiseyour data, or lose your privacy if you arenot carefulabout whatyou download or who you trust. Itcan exposeyou to performance issues if you download or sharetoo many files at once or use an unreliable torrentclient. You may experience slow speeds, connection problems, or device crashes if you do not manage your bandwidth or resources properly. 23:28 DEPARTMENTOF CA: ITER 17 What Are the Challenges of Torrenting?
  • 18. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 18 How Can You Torrent Safely and Responsibly?? Onlydownloadtorrentsfrom reputable websites,confirmingthe legitimacyof the torrentsyou’re using,usingagood P2P client, avoidingcopyrighted material,and gettinga VPN. A VPN isa service thatencryptsyour internettrafficandhidesyourIP addressfromothers.Thiscan help youprotect youridentityandactivity fromyour internetserviceprovider (ISP),authorities,rightsholders, hackers,andother maliciousactors. A VPN can alsohelpyouaccess blockedorrestrictedtorrentsites and contentinyourregionby changingyourvirtual locationto anothercountrywhere theyare available.
  • 19. S ‘O’ A UNIVERSITY BHUBANESWAR In this presentation, we learned about decentralisation and torrenting. We learned what they are, how they work, what are their benefits and challenges, and how to use them safely and responsibly. 23:28 DEPARTMENTOF CA: ITER 19 Conclusion
  • 20. S ‘O’ A UNIVERSITY BHUBANESWAR Cohen, B. (2003). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems (Vol. 6, pp. 68-72). Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., ... & Sips, H. (2005). Tribler: A social-based peer-to-peer system. In 5th InternationalWorkshop on Peer-to-Peer Systems(IPTPS) (Vol. 2006). Cohen, B. (2008). TheBitTorrentprotocolspecification. Cohen, B., & Loewenstein, J. (2010). BitTorrentlive: A low-latency live P2P video streaming system. In Proceedings of the2010 ACMworkshop on Peer-to-peer streaming and IP-TV (pp. 127-132). Cohen, B., & Shen, R. (2012). Torrents of tweets: A study of the twitter backbone. In Proceedings of the 2012 ACMworkshop on Workshop on online socialnetworks (pp. 41-46). Cohen, B., & Shen, R. (2013). Academic torrents: Scalabledata distribution for research. In Proceedings of the2013 IEEE/ACM International Conferenceon Advances in Social Networks Analysis and Mining (pp. 1449-1450). https://torrentfreak.com/academics-launch-torrent-site-to-share-papers-and-datasets-140131/. 23:28 DEPARTMENTOF CA: ITER 20 References
  • 21. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 21 Thank You! Any Questions?