SlideShare ist ein Scribd-Unternehmen logo
1 von 32
UNRAVELING
Bit-Torrent
Guided by :

Presented by :

Ms. Nibedita Jagdev
Assistant Professor
Department of CSE

Sudhansu Sekhar Dash
CSE – D, 7th Semester
Regd.no-1011012190
 Introduction
 Background Study
 Peer-to-Peer Architecture
 Implementation Of P2P Network
 Introduction To Bit-Torrent
 Terminologies In Bit-Torrent
 Working Of Bit-Torrent
 Recent Developments
 Conclusion
 Bit Torrent was created by Bram Cohen in 2001.
 It is a file transferring system that allows peer
to peer (P2P) data communication .
 It is used to transfer very huge files.
 All torrent clients use the Bit Torrent Protocol.
 This is the most popular and efficient file

transferring system.
 More efficient than the Client–Server System.

Figure 1: Author Of Bit-Torrent Protocol
 Client sends the GET Message to Server.
 Server sends the required files.
 Transfer is handled by FTP and HTTP.
Advantages :
 Most widely used model.
 Easy to implement.
Disadvantages :
 Traffic congestion.
 Whole system crashes, when server fails.

Figure 2: Common Client–Server Model
• A peer-to-peer (P2P) network is a type
of decentralized and distributed network
architecture .
• In this architecture, individual nodes in the
network are called as the ”peers”.
• All nodes act as both suppliers and
consumers of resources, in contrast to the
centralized Client–Server Model where client
nodes request access to resources provided
by central servers.
Figure 3 : A Common P2P Network
 The P2P architecture was first pioneered by NAPSTER
(a famous online music provider in MP3 format) in
1999.
 Further development in this field was later made by
KaZaA (FastTrack) which helped in the sharing of
music
as
well
as
the
video
files.
 It was best implemented by Gnutella which is a fully
distributed alternative to the semi-centralized
systems such as the KaZaA & Napster.
Figure 4 : Original Napster

Figure 5 : KAZAA

Figure 6 : Bit-Torrent
 Bit-torrents (also known as the
"torrents") work by downloading
small segments of files from
different web sources at the same
time.
 It enables fast downloading of
large files using minimum internet
bandwidth.

Figure 7 : A Bit-Torrent Network


Seed:



A seed refers to a machine possessing the
complete data.



A downloader that obtains 100% of the
data also becomes a seed.



Leech:



Leecher , (synonymous with downloader),
is a peer or any client that does not have
100% of the data.



Leech also refers to a peer (or peers) that
has a negative effect on the swarm by
having a very poor share ratio.

Figure 8 : Seeds & Peers In A Bit-torrent Client
 Swarm:
• All the peers (including seeds), sharing a torrent are called
as the swarms. For example, six ordinary peers and
two
seeds
make
a
swarm
of
eight.

 .torrent File:
• A torrent can mean either a .torrent metadata file or all
files described by it, depending on context.
• The torrent file contains metadata about all the files it
makes downloadable, including their names and sizes
and checksums of all pieces in the torrent.
FIG 9: PARTS OF A TORRENT NETWORK

FIG 10: SWARM OF PEERS IN A TORRENT NETWORK
 Tracker:
• A tracker is a server that keeps track of
those seeds & peers that are in the
swarm.
• The tracker is not directly involved in the
data transfer and does not have a copy of
the file.
Figure 11: Working Of Tracker
Client:
• A Bit Torrent client is an executable
program which implements the BitTorrent protocol in it.
• It runs together with the operating
system on a user‟s machine, and
handles interactions with the
tracker and peers.
Figure 12: Working of Client
 Piece (of a file):
 The file which is to be downloaded is
divided into similar size of pieces but
last piece size varies.
 These pieces
parallel.
 Each piece is
different peers.

are

downloaded

downloaded

in

from

Example : A 1.4Mb file
could be split into the
following pieces:
5 * 256kb pieces, and a
final piece of 120kb.
 The torrent file functions as a special pointer to locate a
specific file and the swarm of people currently sharing that
file.
 The torrent client software, then talks to a tracker server for
2 to 10 minutes, while it scours the internet for people to
swarm with.
 As the tracker locates torrent users to swarm with, each user
will be automatically labeled as either a “leech/peer” or as
a “seed”.
 Then the client software then begins the transfer depending
upon the connection type.
 Once the transfer is complete, seeding starts automatically.
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
Web page
with link
to .torrent

Tracker

Web Server

C
A
Peer
[Leech]
Downloader

Peer
B
Peer
[Leech]

[Seed]
FIG 9 COMPLETE WORKFLOW OF BIT TORRENT
The behavior of a peer running the Bit-Torrent
peer-to-peer protocol is mostly determined by
two algorithms:
 Peer Selection Algorithm : Determines who the
local peer will cooperate with i.e. who it will
download from and upload to.
 Piece Selection Algorithm : Determines which
pieces of the file being downloaded should be
obtained from which peer as the download
progresses.
Piece selection is divided into 3 steps:
• Random First Piece
1. A piece is selected at random to get the download started.
2. Random pieces are then chosen until the first piece is completed

• Rarest First
When a peer selects which piece to download next, the rarest piece
will be chosen from the current swarm.

• Endgame mode
1. Defense against the “last-block problem”
2. Send requests for missing sub-pieces to all peers in our peer list
3. Send cancel messages upon receipt of a sub-piece
Peer selection is divided into 3 parts:

• Choking:
1. When a peer receives a request for a piece from
another peer, it can opt to refuse to transmit that
piece. If this happens, the peer is said to be
choked.
2. The most common option is that by default, a
client will only maintain a default number of
simultaneous uploads (max_uploads).
3. All further requests to the client will be marked
as choked.
• Optimistic Unchoking:
1. To ensure that connections with the best data transfer rates are
not favoured, each peer has a reserved „optimistic unchoke‟
which is left unchoked regardless of the current transfer rate.
2. The peer which is assigned to this is rotated every 30 seconds.
This is enough time for the upload / download rates to reach
maximum capacity.
3. The peers then cooperate using the tit for tat strategy, where the
downloader responds in one period with the same action the
uploader used in the last period.
Advantages:
• Bit Torrent is one of the most common protocols for transferring large files
and peer-to-peer networks.
• As of February 2013, BitTorrent was responsible for 3.35% of all worldwide
bandwidth, more than half of the 6% of total bandwidth dedicated to file
sharing.
• Demand of torrent file sharing has doubled due to latest smartphones and
tablets.

Disadvantages:
• Possibility of sharing any file type has led bit torrent to Legal issues with
Piracy & Copyright Infringement Laws which has hampered its credibility.
RECENT DEVELOPMENTS
 Bit Torrent Sync:

A file synchronizing tool to sync files between devices on a local network, or
between
remote
devices
over
the
Internet
via
secure,
distributed P2P technology.( Launched since August 2013)
 Bit Torrent plus:
Upgraded bit torrent client for premium customers providing additional
features such as inbuilt virus protection , hd playback,Faster downloads ,etc.
 Bit Torrent live - A New Way to Live Broadcast
1. Bit Torrent Live is a powerful new web-based live streaming technology.
2.

Designed to eliminate barriers to, Live is an entirely new protocol,
designed to deliver high quality video to large audiences - with significant
reduction in infrastructure cost and network delays.
 Bit torrent is a very widely used peer to peer protocol in current network
scenario
 A growing number of individuals and organizations are using BitTorrent to
distribute their own or licensed material.

 Because of its simplicity & flexibility bit torrent has become the most widely
used to transfer files like music,videos,games, etc.
 As of January 2012, BitTorrent is utilized by 150 million active users
(according to BitTorrent, Inc.)
REFERENCES
[1] http://www.morehawes.co.uk/the-bittorrent-protocol.html
[2] http://www.howtogeek.com/141257/htg-explains-how-does-bittorrent-work
[3] www.slideshare.net/gsantosh031/bit-torrent-ppt
[4] A. R. Bharambe, C. Herley and V. N. Padmanabhan, “Analyzing and Improving
Bit Torrent Performance”, Technical Report MSR-TR-2005-03, Microsoft Research,
USA, Feb 2005
[5] www.cs.cornell.edu/courses/cs514/2008sp/bittorrent.ppt
[6] https://en.wikipedia.org/wiki/Bit_torrent
[7] http://www.bittorrent.org/protocol.html
UNRAVEILING BIT-TORRENT

Weitere ähnliche Inhalte

Was ist angesagt?

Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology pptAkshay K Sajan
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocoltmont
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology Parth Akbari
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 

Was ist angesagt? (20)

Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Torrent
TorrentTorrent
Torrent
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Torrents
TorrentsTorrents
Torrents
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 

Andere mochten auch

Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje VirtualJosé D Landa
 
IT-youtube Presentation
IT-youtube PresentationIT-youtube Presentation
IT-youtube Presentationsafiya999
 
10 Fundamentals of a Creative Strategy on YouTube
10 Fundamentals of a Creative Strategy on YouTube10 Fundamentals of a Creative Strategy on YouTube
10 Fundamentals of a Creative Strategy on YouTubeSocial Media for Nonprofits
 
YouTube Digital Marketing Background & Strategy
YouTube Digital Marketing Background & StrategyYouTube Digital Marketing Background & Strategy
YouTube Digital Marketing Background & StrategyWilliam Blazejeski
 
YouTube Content ID Handbook - Google
YouTube Content ID Handbook - GoogleYouTube Content ID Handbook - Google
YouTube Content ID Handbook - GoogleCarlos Pacheco
 
Youtube Presentation
Youtube PresentationYoutube Presentation
Youtube Presentationtownsend
 
YouTube Presentation
YouTube PresentationYouTube Presentation
YouTube Presentationguest786f62
 

Andere mochten auch (8)

Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje Virtual
 
IT-youtube Presentation
IT-youtube PresentationIT-youtube Presentation
IT-youtube Presentation
 
10 Fundamentals of a Creative Strategy on YouTube
10 Fundamentals of a Creative Strategy on YouTube10 Fundamentals of a Creative Strategy on YouTube
10 Fundamentals of a Creative Strategy on YouTube
 
YouTube Digital Marketing Background & Strategy
YouTube Digital Marketing Background & StrategyYouTube Digital Marketing Background & Strategy
YouTube Digital Marketing Background & Strategy
 
YouTube Content ID Handbook - Google
YouTube Content ID Handbook - GoogleYouTube Content ID Handbook - Google
YouTube Content ID Handbook - Google
 
Youtube Presentation
Youtube PresentationYoutube Presentation
Youtube Presentation
 
YouTube Presentation
YouTube PresentationYouTube Presentation
YouTube Presentation
 

Ähnlich wie UNRAVEILING BIT-TORRENT

Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsWaqas Tariq
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocolINSIGHT FORENSIC
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4raeshu
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocolNishan Shetty
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolKarwan Jacksi
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptxMac Pat
 

Ähnlich wie UNRAVEILING BIT-TORRENT (18)

Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent in a P2P social network
Bittorrent in a P2P social networkBittorrent in a P2P social network
Bittorrent in a P2P social network
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
BitTorrent.pdf
BitTorrent.pdfBitTorrent.pdf
BitTorrent.pdf
 
Peer to peer_v2pptx
Peer to peer_v2pptxPeer to peer_v2pptx
Peer to peer_v2pptx
 

Kürzlich hochgeladen

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

UNRAVEILING BIT-TORRENT

  • 1. UNRAVELING Bit-Torrent Guided by : Presented by : Ms. Nibedita Jagdev Assistant Professor Department of CSE Sudhansu Sekhar Dash CSE – D, 7th Semester Regd.no-1011012190
  • 2.  Introduction  Background Study  Peer-to-Peer Architecture  Implementation Of P2P Network  Introduction To Bit-Torrent  Terminologies In Bit-Torrent  Working Of Bit-Torrent  Recent Developments  Conclusion
  • 3.  Bit Torrent was created by Bram Cohen in 2001.  It is a file transferring system that allows peer to peer (P2P) data communication .  It is used to transfer very huge files.  All torrent clients use the Bit Torrent Protocol.  This is the most popular and efficient file transferring system.  More efficient than the Client–Server System. Figure 1: Author Of Bit-Torrent Protocol
  • 4.  Client sends the GET Message to Server.  Server sends the required files.  Transfer is handled by FTP and HTTP. Advantages :  Most widely used model.  Easy to implement. Disadvantages :  Traffic congestion.  Whole system crashes, when server fails. Figure 2: Common Client–Server Model
  • 5. • A peer-to-peer (P2P) network is a type of decentralized and distributed network architecture . • In this architecture, individual nodes in the network are called as the ”peers”. • All nodes act as both suppliers and consumers of resources, in contrast to the centralized Client–Server Model where client nodes request access to resources provided by central servers. Figure 3 : A Common P2P Network
  • 6.  The P2P architecture was first pioneered by NAPSTER (a famous online music provider in MP3 format) in 1999.  Further development in this field was later made by KaZaA (FastTrack) which helped in the sharing of music as well as the video files.  It was best implemented by Gnutella which is a fully distributed alternative to the semi-centralized systems such as the KaZaA & Napster.
  • 7. Figure 4 : Original Napster Figure 5 : KAZAA Figure 6 : Bit-Torrent
  • 8.  Bit-torrents (also known as the "torrents") work by downloading small segments of files from different web sources at the same time.  It enables fast downloading of large files using minimum internet bandwidth. Figure 7 : A Bit-Torrent Network
  • 9.  Seed:  A seed refers to a machine possessing the complete data.  A downloader that obtains 100% of the data also becomes a seed.  Leech:  Leecher , (synonymous with downloader), is a peer or any client that does not have 100% of the data.  Leech also refers to a peer (or peers) that has a negative effect on the swarm by having a very poor share ratio. Figure 8 : Seeds & Peers In A Bit-torrent Client
  • 10.  Swarm: • All the peers (including seeds), sharing a torrent are called as the swarms. For example, six ordinary peers and two seeds make a swarm of eight.  .torrent File: • A torrent can mean either a .torrent metadata file or all files described by it, depending on context. • The torrent file contains metadata about all the files it makes downloadable, including their names and sizes and checksums of all pieces in the torrent.
  • 11. FIG 9: PARTS OF A TORRENT NETWORK FIG 10: SWARM OF PEERS IN A TORRENT NETWORK
  • 12.  Tracker: • A tracker is a server that keeps track of those seeds & peers that are in the swarm. • The tracker is not directly involved in the data transfer and does not have a copy of the file. Figure 11: Working Of Tracker
  • 13. Client: • A Bit Torrent client is an executable program which implements the BitTorrent protocol in it. • It runs together with the operating system on a user‟s machine, and handles interactions with the tracker and peers. Figure 12: Working of Client
  • 14.  Piece (of a file):  The file which is to be downloaded is divided into similar size of pieces but last piece size varies.  These pieces parallel.  Each piece is different peers. are downloaded downloaded in from Example : A 1.4Mb file could be split into the following pieces: 5 * 256kb pieces, and a final piece of 120kb.
  • 15.  The torrent file functions as a special pointer to locate a specific file and the swarm of people currently sharing that file.  The torrent client software, then talks to a tracker server for 2 to 10 minutes, while it scours the internet for people to swarm with.  As the tracker locates torrent users to swarm with, each user will be automatically labeled as either a “leech/peer” or as a “seed”.  Then the client software then begins the transfer depending upon the connection type.  Once the transfer is complete, seeding starts automatically.
  • 16. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 17. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 18. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 19. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 20. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 21. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 22. Web page with link to .torrent Tracker Web Server C A Peer [Leech] Downloader Peer B Peer [Leech] [Seed]
  • 23. FIG 9 COMPLETE WORKFLOW OF BIT TORRENT
  • 24. The behavior of a peer running the Bit-Torrent peer-to-peer protocol is mostly determined by two algorithms:  Peer Selection Algorithm : Determines who the local peer will cooperate with i.e. who it will download from and upload to.  Piece Selection Algorithm : Determines which pieces of the file being downloaded should be obtained from which peer as the download progresses.
  • 25. Piece selection is divided into 3 steps: • Random First Piece 1. A piece is selected at random to get the download started. 2. Random pieces are then chosen until the first piece is completed • Rarest First When a peer selects which piece to download next, the rarest piece will be chosen from the current swarm. • Endgame mode 1. Defense against the “last-block problem” 2. Send requests for missing sub-pieces to all peers in our peer list 3. Send cancel messages upon receipt of a sub-piece
  • 26. Peer selection is divided into 3 parts: • Choking: 1. When a peer receives a request for a piece from another peer, it can opt to refuse to transmit that piece. If this happens, the peer is said to be choked. 2. The most common option is that by default, a client will only maintain a default number of simultaneous uploads (max_uploads). 3. All further requests to the client will be marked as choked.
  • 27. • Optimistic Unchoking: 1. To ensure that connections with the best data transfer rates are not favoured, each peer has a reserved „optimistic unchoke‟ which is left unchoked regardless of the current transfer rate. 2. The peer which is assigned to this is rotated every 30 seconds. This is enough time for the upload / download rates to reach maximum capacity. 3. The peers then cooperate using the tit for tat strategy, where the downloader responds in one period with the same action the uploader used in the last period.
  • 28. Advantages: • Bit Torrent is one of the most common protocols for transferring large files and peer-to-peer networks. • As of February 2013, BitTorrent was responsible for 3.35% of all worldwide bandwidth, more than half of the 6% of total bandwidth dedicated to file sharing. • Demand of torrent file sharing has doubled due to latest smartphones and tablets. Disadvantages: • Possibility of sharing any file type has led bit torrent to Legal issues with Piracy & Copyright Infringement Laws which has hampered its credibility.
  • 29. RECENT DEVELOPMENTS  Bit Torrent Sync: A file synchronizing tool to sync files between devices on a local network, or between remote devices over the Internet via secure, distributed P2P technology.( Launched since August 2013)  Bit Torrent plus: Upgraded bit torrent client for premium customers providing additional features such as inbuilt virus protection , hd playback,Faster downloads ,etc.  Bit Torrent live - A New Way to Live Broadcast 1. Bit Torrent Live is a powerful new web-based live streaming technology. 2. Designed to eliminate barriers to, Live is an entirely new protocol, designed to deliver high quality video to large audiences - with significant reduction in infrastructure cost and network delays.
  • 30.  Bit torrent is a very widely used peer to peer protocol in current network scenario  A growing number of individuals and organizations are using BitTorrent to distribute their own or licensed material.  Because of its simplicity & flexibility bit torrent has become the most widely used to transfer files like music,videos,games, etc.  As of January 2012, BitTorrent is utilized by 150 million active users (according to BitTorrent, Inc.)
  • 31. REFERENCES [1] http://www.morehawes.co.uk/the-bittorrent-protocol.html [2] http://www.howtogeek.com/141257/htg-explains-how-does-bittorrent-work [3] www.slideshare.net/gsantosh031/bit-torrent-ppt [4] A. R. Bharambe, C. Herley and V. N. Padmanabhan, “Analyzing and Improving Bit Torrent Performance”, Technical Report MSR-TR-2005-03, Microsoft Research, USA, Feb 2005 [5] www.cs.cornell.edu/courses/cs514/2008sp/bittorrent.ppt [6] https://en.wikipedia.org/wiki/Bit_torrent [7] http://www.bittorrent.org/protocol.html