SlideShare a Scribd company logo
1 of 27
Prepared By :- Harsh M Tirghoda
BitTorrent is an open-source peer-to-peer protocol designed for the transfer of large files. The central philosophy underlying BitTorrent is that users should upload data simultaneously with their downloading which maximizes network bandwidth efficiency. BitTorrent is designed to be more efficient and will work better if there are more people interested in a specific file. The protocol is the brainchild of programmer Bram Cohen, who designed it in April 2001 and released a first implementation on 2 July 2001. It is now maintained by Cohen's company BitTorrent, Inc. What is BitTorrent..?
Peer-to-peer protocols, use a network of clients (each functioning as a server) to send data to other users who are looking for similar files. The only server in a BitTorrent network is a tracker which monitors which files are available and where, and directs clients who are looking for the files for downloading to where the files are available. Peer-to-peer transfer protocols are less expensive than the client-server model. Another advantage of BitTorrent is that it is an open source application. BitTorrent is free unlike other peer-to-peer systems (e.g. Kazaa, Gnutella). Any user can download the software and have it ready for use. In-house programmers can also modify the system to their companies' specific needs and requirements. BitTorrent: Peer-to-Peer File Transfer Protocol
The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. If the file is both large and popular, the demands on the server are great, and the download will be slow.  Traditional Client-Server Downloading
Peer-to-peer file sharing  is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called  peers . The process works like this: You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download.  To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.  When the software finds a computer that has the file you want on its hard drive, the download begins.  Others using the file-sharing software can obtain files they want from your computer's hard drive.  Peer-to-peer File Sharing
The file-transfer load is distributed between the computers exchanging files. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called  leeching .  This limits the number of computers the software can search for the requested file. Gnutella's peer-to-peer download process
Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server (called a  tracker ).  Another difference is that it uses a principal called  tit-for-tat . This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goals. With BitTorrent, the more files you share with others, the faster your downloads are.  Finally, to make better use of available Internet bandwidth, BitTorrent downloads different pieces of the file you want simultaneously from multiple computers. What BitTorrent Does
You open a Web page and click on a link for the file you want.  BitTorrent client software communicates with a  tracker  to find other computers running BitTorrent that have the complete file ( seed  computers) and those with a portion of the file (peers that are usually in the process of downloading the file).  The tracker identifies the  swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.  BitTorrent's peer-to-peer download process
The tracker identifies the  swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.  The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.  If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.  Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, BitTorrent is especially useful for large, popular files.  Here's how it works:
It is important to be aware of the terminology used when downloading torrent files: Client  - A client is the actual P2P sharing program and it is usually an application that is downloaded and installed on the computer that you would like to use for sharing and downloading files. Two popular P2P clients are Azureus and UTorrent (more on these clients below). Tracker  - A tracker is a central server that manages the sharing of files among its many users. Most clients have built in trackers; there are also specific tracking programs such as BNBT and CBTT.  Seeder  - A seeder is considered a computer that has a complete copy of a file another computer is requesting. For instance, if you would like to download an mp3, you must first make sure that the tracker can find a full copy (seed) of the file that you would like to download. Important Terms You Should Know When Downloading Torrent Files
Leeches  - A leach is a person that is downloading a file or files from other computers, but is not sharing any files of his or her own. Leeching is considered bad etiquette on P2P clients. Swarm  - A swarm is when two or more computers are simultaneously downloading and sharing the same file. Most clients allow a computer to download a file and then upload to others the parts that already have been downloaded. .torrent  - a torrent is a file that is downloaded from an index web site and  sometimes referred to as an archive. It is a very small file usually less than 25bits, that is necessary for your client to start and manage the file transfer process so you can download the file. Important Terms You Should Know When Downloading Torrent Files
First download and install a torrent client. Remember the torrent client is considered the command center for your P2P file sharing. You can choose many different types of torrent sharing clients; however two highly recommended clients are UTorrent and Azureus. Once you have your torrent client downloaded and installed, you will need to search for files that you would like to download. Usually you can visit many index web sites such as Pirate bay and Torrent Spy. Most torrent clients have a list handy of the best index web sites. Now, just search for the file that you would like to download. Some of these sites offer advanced searches such as the ability to search for a video file, music file, application file or all of the above. It is usually extremely easy to locate the torrent file that you would like to download. Once you have searched for a specific file, your index web site should return a list of available torrent files. Look to see which torrent files have the most seeders, usually this will give you the fastest download times and highest quality files. How to Download a Torrent File
Once you find the torrent file that you would like to download, click the download link and save it onto your computer. These files are usually very small, around 200kb. Now that you have the torrent file or archive on your computer, double click this file and your torrent client should automatically open up. At this time, the tracker program will come online as well and will start to manage and download your file. While each client and tracker program is different, you should be able to see how many people are downloading the file, seeding and sharing or leeching. You should also see the progress of your computer downloading the file and the amount of time remaining until the file is completely downloaded. All you have to do now is waiting until all the data is downloaded and then you can enjoy your new downloaded file. How to Download a Torrent File
While there are more than a dozen P2P torrent clients available, two of the top rated P2P torrent clients are UTorrent and Azureus.    Utorrent Utorrent is actually torrent and means micro torrent. It is a freeware Bit Torrent client that works great on Windows computers. The major feature of this Bit Torrent client is that the entire program is only around 200 Kb. This program was developed to require the least amount of computer resources and give as much functionality as possible. Although UTorrent is extremely small it has a lot of features including Unicode support, protocol encryption, peer exchange with other UTorrent users and Azureus users (this feature goes above and beyond normal P2P, similar to chat), configurable bandwidth settings, Customizable user interface, initial seeding and the availability of this application in 38 languages. Top P2P Torrent Clients
Azureus is another P2P Torrent Client, it is based on Java (You need to have JRE installed, but that is very common).It is also a free software client and it works on many different platforms including Windows, Mac, Linux and UNIX. One of the key features of Azureus is that it allows multiple download files easily from a GUI interface. You can also open up and view or hear files that are currently downloading, but not yet complete. This makes it easy to check the quality of the file before you spend a significant amount of time downloading it. Azureus has its own tracker program so you can easily share files without uploading them to centralized sites. Azureus is considered one of the top Bit Torrent clients and has a wealth of features that are designed and integrated into the client very well.  Top P2P Torrent Clients
ABC - Another BT client BitTornado G3 Torrent BitComet Vuze (Azureus 3.0) Some other BitTorrent Clients
ABC - Another BT client
BitTornado
G3 Torrent
BitComet
Vuze (Azureus 3.0)
BNBT  is a complete port of the original Python-based BitTorrent tracker for speed and efficiency. BNBT also offers many additional features not present in the original tracker. CBTT  is a modified BNBT-Based BitTorrent tracker project developed primarily by DreadWingKnight EasyTracker  is a customized version of BNBT specifically designed for Windows users. It even comes with an installer and detailed installation and customization instructions. XBNBT  is a modified, open source, BitTorrent tracker based on BNBT, offers many additional features such as support for flat-file or MySQL database operation, control over TCP parameters, additional administrative, statistics, and control options, additional filter and search facilities, and more. BitTorrent Trackers
Lack of anonymity BitTorrent does not offer its users anonymity. It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker. This may expose users with insecure systems to attacks.  Dialup versus broadband BitTorrent is best suited to continuously connected broadband environments, since dial-up users find it less efficient due to frequent disconnects and slow download rates. Limitations and security
The leech problem BitTorrent file sharers, compared to users of client/server technology, often have little incentive to become seeders after they finish downloading. The result of this is that torrent swarms gradually die out, meaning a lower possibility of obtaining older torrents.  The cheater problem There are "cheating" clients like BitThief which claim to be able to download without uploading, and because of this can sometimes download faster than regular clients. Such exploitation negatively affects the cooperative nature of the BitTorrent protocol. Limitations and security
Bit Torrent Clients are usually the fastest, most affordable and most convenient way to share files among many users. Most Bit Torrent P2P users can find plenty of files available and download them with ease. With the explosion of broadband, you can easily find and download files of any size, from mp3's to large multi gigabyte video files.  But, sometimes Bit Torrent clients include adware or spyware, so it is favorable to use this only if you’re having An effective antivirus application with spyware & adware detector. Make sure you always download the client from the official web site and read the EULA (end user licensing agreement) to make sure there are no adware or spyware included. Conclusion
[object Object],[object Object],[object Object],[object Object],[object Object],References
 

More Related Content

What's hot

Vulnerable_and_outdated_components_suman.pptx
Vulnerable_and_outdated_components_suman.pptxVulnerable_and_outdated_components_suman.pptx
Vulnerable_and_outdated_components_suman.pptxSuman Astani
 
XSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hourXSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hoursnoopythesecuritydog
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Abusing Symlinks on Windows
Abusing Symlinks on WindowsAbusing Symlinks on Windows
Abusing Symlinks on WindowsOWASP Delhi
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
XSS & SQL injection
XSS & SQL injectionXSS & SQL injection
XSS & SQL injectionThieu Mao
 
How to build a change workflow process
How to build a change workflow processHow to build a change workflow process
How to build a change workflow processTufin
 
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...Mauricio Velazco
 
CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3Sam Bowne
 
Web Application Penetration Tests - Information Gathering Stage
Web Application Penetration Tests - Information Gathering StageWeb Application Penetration Tests - Information Gathering Stage
Web Application Penetration Tests - Information Gathering StageNetsparker
 
Cain
CainCain
Caingasay
 

What's hot (20)

Vulnerable_and_outdated_components_suman.pptx
Vulnerable_and_outdated_components_suman.pptxVulnerable_and_outdated_components_suman.pptx
Vulnerable_and_outdated_components_suman.pptx
 
XSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hourXSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hour
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Recon in Pentesting
Recon in PentestingRecon in Pentesting
Recon in Pentesting
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Abusing Symlinks on Windows
Abusing Symlinks on WindowsAbusing Symlinks on Windows
Abusing Symlinks on Windows
 
Responding to Cobalt Strike
Responding to Cobalt StrikeResponding to Cobalt Strike
Responding to Cobalt Strike
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
XSS & SQL injection
XSS & SQL injectionXSS & SQL injection
XSS & SQL injection
 
How to build a change workflow process
How to build a change workflow processHow to build a change workflow process
How to build a change workflow process
 
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
 
CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3CNIT 126: Ch 2 & 3
CNIT 126: Ch 2 & 3
 
Web Application Penetration Tests - Information Gathering Stage
Web Application Penetration Tests - Information Gathering StageWeb Application Penetration Tests - Information Gathering Stage
Web Application Penetration Tests - Information Gathering Stage
 
Cain
CainCain
Cain
 

Viewers also liked

Viewers also liked (20)

Lecture 1. introduction
Lecture 1. introductionLecture 1. introduction
Lecture 1. introduction
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
техник хангамж
техник хангамжтехник хангамж
техник хангамж
 
Torrent
TorrentTorrent
Torrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
2011 (5) mar
2011 (5) mar2011 (5) mar
2011 (5) mar
 
Exist Customer Success Stories
Exist Customer Success StoriesExist Customer Success Stories
Exist Customer Success Stories
 
Hoja de ruta jornada de inducción a madres y padres
Hoja de ruta jornada de inducción a madres y padresHoja de ruta jornada de inducción a madres y padres
Hoja de ruta jornada de inducción a madres y padres
 
Mengapa harus abe
Mengapa harus abeMengapa harus abe
Mengapa harus abe
 
Saint louis science center
Saint louis science centerSaint louis science center
Saint louis science center
 
Exploring membership 4
Exploring membership 4Exploring membership 4
Exploring membership 4
 
嘔氣~不要跟你的愛人
嘔氣~不要跟你的愛人嘔氣~不要跟你的愛人
嘔氣~不要跟你的愛人
 
Reaching millennials who leave
Reaching millennials who leaveReaching millennials who leave
Reaching millennials who leave
 
Marketing Day - French Style or German Reliability - Alex Kowalczyk
Marketing Day - French Style or German Reliability - Alex KowalczykMarketing Day - French Style or German Reliability - Alex Kowalczyk
Marketing Day - French Style or German Reliability - Alex Kowalczyk
 
Wire Checklist
Wire ChecklistWire Checklist
Wire Checklist
 
Paying the preacher 2
Paying the preacher 2Paying the preacher 2
Paying the preacher 2
 
Off the Shelf 1.2
Off the Shelf 1.2Off the Shelf 1.2
Off the Shelf 1.2
 
Sharing your faith training
Sharing your faith trainingSharing your faith training
Sharing your faith training
 

Similar to Torrent Protocol

Similar to Torrent Protocol (20)

Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Torrent Protocol

  • 1. Prepared By :- Harsh M Tirghoda
  • 2. BitTorrent is an open-source peer-to-peer protocol designed for the transfer of large files. The central philosophy underlying BitTorrent is that users should upload data simultaneously with their downloading which maximizes network bandwidth efficiency. BitTorrent is designed to be more efficient and will work better if there are more people interested in a specific file. The protocol is the brainchild of programmer Bram Cohen, who designed it in April 2001 and released a first implementation on 2 July 2001. It is now maintained by Cohen's company BitTorrent, Inc. What is BitTorrent..?
  • 3. Peer-to-peer protocols, use a network of clients (each functioning as a server) to send data to other users who are looking for similar files. The only server in a BitTorrent network is a tracker which monitors which files are available and where, and directs clients who are looking for the files for downloading to where the files are available. Peer-to-peer transfer protocols are less expensive than the client-server model. Another advantage of BitTorrent is that it is an open source application. BitTorrent is free unlike other peer-to-peer systems (e.g. Kazaa, Gnutella). Any user can download the software and have it ready for use. In-house programmers can also modify the system to their companies' specific needs and requirements. BitTorrent: Peer-to-Peer File Transfer Protocol
  • 4. The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. If the file is both large and popular, the demands on the server are great, and the download will be slow. Traditional Client-Server Downloading
  • 5. Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers . The process works like this: You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download. To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software. When the software finds a computer that has the file you want on its hard drive, the download begins. Others using the file-sharing software can obtain files they want from your computer's hard drive. Peer-to-peer File Sharing
  • 6. The file-transfer load is distributed between the computers exchanging files. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching . This limits the number of computers the software can search for the requested file. Gnutella's peer-to-peer download process
  • 7. Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server (called a tracker ). Another difference is that it uses a principal called tit-for-tat . This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goals. With BitTorrent, the more files you share with others, the faster your downloads are. Finally, to make better use of available Internet bandwidth, BitTorrent downloads different pieces of the file you want simultaneously from multiple computers. What BitTorrent Does
  • 8. You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file ( seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file). The tracker identifies the swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. BitTorrent's peer-to-peer download process
  • 9. The tracker identifies the swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system. Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, BitTorrent is especially useful for large, popular files. Here's how it works:
  • 10. It is important to be aware of the terminology used when downloading torrent files: Client - A client is the actual P2P sharing program and it is usually an application that is downloaded and installed on the computer that you would like to use for sharing and downloading files. Two popular P2P clients are Azureus and UTorrent (more on these clients below). Tracker - A tracker is a central server that manages the sharing of files among its many users. Most clients have built in trackers; there are also specific tracking programs such as BNBT and CBTT. Seeder - A seeder is considered a computer that has a complete copy of a file another computer is requesting. For instance, if you would like to download an mp3, you must first make sure that the tracker can find a full copy (seed) of the file that you would like to download. Important Terms You Should Know When Downloading Torrent Files
  • 11. Leeches - A leach is a person that is downloading a file or files from other computers, but is not sharing any files of his or her own. Leeching is considered bad etiquette on P2P clients. Swarm - A swarm is when two or more computers are simultaneously downloading and sharing the same file. Most clients allow a computer to download a file and then upload to others the parts that already have been downloaded. .torrent - a torrent is a file that is downloaded from an index web site and sometimes referred to as an archive. It is a very small file usually less than 25bits, that is necessary for your client to start and manage the file transfer process so you can download the file. Important Terms You Should Know When Downloading Torrent Files
  • 12. First download and install a torrent client. Remember the torrent client is considered the command center for your P2P file sharing. You can choose many different types of torrent sharing clients; however two highly recommended clients are UTorrent and Azureus. Once you have your torrent client downloaded and installed, you will need to search for files that you would like to download. Usually you can visit many index web sites such as Pirate bay and Torrent Spy. Most torrent clients have a list handy of the best index web sites. Now, just search for the file that you would like to download. Some of these sites offer advanced searches such as the ability to search for a video file, music file, application file or all of the above. It is usually extremely easy to locate the torrent file that you would like to download. Once you have searched for a specific file, your index web site should return a list of available torrent files. Look to see which torrent files have the most seeders, usually this will give you the fastest download times and highest quality files. How to Download a Torrent File
  • 13. Once you find the torrent file that you would like to download, click the download link and save it onto your computer. These files are usually very small, around 200kb. Now that you have the torrent file or archive on your computer, double click this file and your torrent client should automatically open up. At this time, the tracker program will come online as well and will start to manage and download your file. While each client and tracker program is different, you should be able to see how many people are downloading the file, seeding and sharing or leeching. You should also see the progress of your computer downloading the file and the amount of time remaining until the file is completely downloaded. All you have to do now is waiting until all the data is downloaded and then you can enjoy your new downloaded file. How to Download a Torrent File
  • 14. While there are more than a dozen P2P torrent clients available, two of the top rated P2P torrent clients are UTorrent and Azureus. Utorrent Utorrent is actually torrent and means micro torrent. It is a freeware Bit Torrent client that works great on Windows computers. The major feature of this Bit Torrent client is that the entire program is only around 200 Kb. This program was developed to require the least amount of computer resources and give as much functionality as possible. Although UTorrent is extremely small it has a lot of features including Unicode support, protocol encryption, peer exchange with other UTorrent users and Azureus users (this feature goes above and beyond normal P2P, similar to chat), configurable bandwidth settings, Customizable user interface, initial seeding and the availability of this application in 38 languages. Top P2P Torrent Clients
  • 15. Azureus is another P2P Torrent Client, it is based on Java (You need to have JRE installed, but that is very common).It is also a free software client and it works on many different platforms including Windows, Mac, Linux and UNIX. One of the key features of Azureus is that it allows multiple download files easily from a GUI interface. You can also open up and view or hear files that are currently downloading, but not yet complete. This makes it easy to check the quality of the file before you spend a significant amount of time downloading it. Azureus has its own tracker program so you can easily share files without uploading them to centralized sites. Azureus is considered one of the top Bit Torrent clients and has a wealth of features that are designed and integrated into the client very well. Top P2P Torrent Clients
  • 16. ABC - Another BT client BitTornado G3 Torrent BitComet Vuze (Azureus 3.0) Some other BitTorrent Clients
  • 17. ABC - Another BT client
  • 22. BNBT is a complete port of the original Python-based BitTorrent tracker for speed and efficiency. BNBT also offers many additional features not present in the original tracker. CBTT is a modified BNBT-Based BitTorrent tracker project developed primarily by DreadWingKnight EasyTracker is a customized version of BNBT specifically designed for Windows users. It even comes with an installer and detailed installation and customization instructions. XBNBT is a modified, open source, BitTorrent tracker based on BNBT, offers many additional features such as support for flat-file or MySQL database operation, control over TCP parameters, additional administrative, statistics, and control options, additional filter and search facilities, and more. BitTorrent Trackers
  • 23. Lack of anonymity BitTorrent does not offer its users anonymity. It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker. This may expose users with insecure systems to attacks. Dialup versus broadband BitTorrent is best suited to continuously connected broadband environments, since dial-up users find it less efficient due to frequent disconnects and slow download rates. Limitations and security
  • 24. The leech problem BitTorrent file sharers, compared to users of client/server technology, often have little incentive to become seeders after they finish downloading. The result of this is that torrent swarms gradually die out, meaning a lower possibility of obtaining older torrents. The cheater problem There are "cheating" clients like BitThief which claim to be able to download without uploading, and because of this can sometimes download faster than regular clients. Such exploitation negatively affects the cooperative nature of the BitTorrent protocol. Limitations and security
  • 25. Bit Torrent Clients are usually the fastest, most affordable and most convenient way to share files among many users. Most Bit Torrent P2P users can find plenty of files available and download them with ease. With the explosion of broadband, you can easily find and download files of any size, from mp3's to large multi gigabyte video files. But, sometimes Bit Torrent clients include adware or spyware, so it is favorable to use this only if you’re having An effective antivirus application with spyware & adware detector. Make sure you always download the client from the official web site and read the EULA (end user licensing agreement) to make sure there are no adware or spyware included. Conclusion
  • 26.
  • 27.