SlideShare ist ein Scribd-Unternehmen logo
1 von 27
BITTORRENT
May22,2013
1
By
K Ravi Teja Varma
09131A1272
B. Tech, 8th Sem
CONTENTS
May22,2013
2
•Introduction
•Types Of Data Sharing
•Traditional Client-Server Downloading
•Peer-Peer Downloading
•Gnutella Network
•Why BitTorrent?
•What actually a BitTorrent is?
•BitTorrent Terminology
•How BitTorrent works?
•Downloading Files Using BitTorrent
•Seeding Torrent
•How to create a dot torrent file
•Conclusion
•References
INTRODUCTION
May22,2013
3
• Humans tend to share things.
• As electronic data plays a vital role these days, they acquire
the “sharing” attribute.
• Sharing electronic data(emails, ebooks, multimedia files) is the
need of the hour.
• Data sharing must be fast enough as we are now moving to 3G
and 4G technologies, users expect data sharing at high speeds.
TYPES OF DATA SHARING
 Manual Sharing Using Removable Media: Such as USB
drives, External Hard disks.
 Centralized Servers of Computer Networks: Network of
computers interconnected for sharing resources and
information via a central server.
 Distributed Peer-to-Peer networking: Is a Computer network
where each system in the network acts as client or server
allowing shared access of resources without the need of
central server.
May22,2013
4
TRADITIONAL CLIENT-SERVER DOWNLOADING
May22,2013
5
•You open a Webpage and click a link to download a file to your
computer.
•The Web browser software on your computer (the client) tells
the server (a central computer that holds the Web page and the file
you want to download) to transfer a copy of the file to your computer.
•The transfer is handled by a protocol (a set of rules), such as FTP
(File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
CONTD.
May22,2013
6
•The transfer speed is affected by a number of variables, including the
type of protocol, the amount of traffic on the server and the number of
other computers that are downloading the file.
•If the file is both large and popular, the demands on the server are great,
and the download will be slow.
PEER-PEER DOWNLOADING
May22,2013
7
•In peer-to-peer sharing, a software program is used instead a Web
Browser to locate computers that have the file user want.
•These are ordinary computers like the users, they are called PEERS.
• The process works like this:
• You run peer-to-peer file-sharing software (for example,
a Napster program or Gnutella) on your computer and send out a
request for the file you want to download.
•To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
CONTD.
May22,2013
8
•When the software finds a computer that has the file you want on
its hard drive , the download begins.
•Others using the file-sharing software can obtain files they want
from your computer's hard drive.
•The file-transfer load is distributed between the computers
exchanging files, but file searches and transfers from your
computer to others can cause bottlenecks.
CONTD.
May22,2013
9
•Some people download files and immediately disconnect without
allowing others to obtain files from their system, which is
called leeching.
• This limits the number of computers the software can search for the
requested file .
GNUTELLA NETWORK
May22,2013
10
How a Gnutella client finds a song
Given that there is no central server to store the names and locations of
all the available files, how does the Gnutella software on your machine
find a song on someone else's machine?
The process goes like this:
• Type the name of the song or file we want to find.
• Your machine knows of at least one other Gnutella machine
somewhere on the network.
CONTD.
May22,2013
11
•Your machine sends the song name you typed in to the Gnutella
machine(s) .
•These machines search to see if the requested file is on the local hard
disk. If so, they send back the file name (and machine IP address) to the
requester.
•At the same time, all of these machines send out the same request to
the machines they are connected to, and the process repeats.
•A request has a TTL (time to live) limit placed on it.
CONTD.
May22,2013
12
 A request might go out six or
seven levels deep before it
stops propagating. If each
machine on the Gnutella
network knows of just four
others, that means that your
request might reach 8,000 or so
other machines on the Gnutella
network if it propagates seven
levels deep.
CONTD.
May22,2013
13
•It is an extremely simple and clever way of distributing a query to
thousands of machines very quickly.
•This approach has one big advantage -- Gnutella works all the
time , as long as you can get to at least one other machine running
Gnutella software, you are able to query the network.
•No court order is going to shut this system down, because there is
no one machine that controls everything.
WHY BITTORRENT?
May22,2013
14
•Unlike some other peer-to-peer downloading
methods, BitTorrent is a protocol that offloads some of the file
tracking work to a central server called a Tracker.
•Another difference is that it uses a principal called tit-for-tat.
•This means that in order to receive files, you have to give
them. This solves the problem of leeching -- one of developer
Bram Cohen's primary goal.
WHAT IS BITTORRENT?
May22,2013
15
•BitTorrent is a protocol that enables fast downloading of large files
using minimum Internet bandwidth.
•It costs nothing to use and includes no spyware or pop-up
advertising.
•The most popular video, audio or software files can be transferred
faster and cheaper by using BitTorrent.
BITTORRENT TERMINOLOGY
May22,2013
16
Leeches - People who download files but do not share files
on their own computer with others.
Seed or seeder - A computer with a complete copy of a
BitTorrent file (At least one seed computer is necessary for a
BitTorrent download to operate).
Swarm - A group of computers simultaneously sending
(uploading) or receiving (downloading) the same file.
.torrent - A pointer file that directs your computer to the file
you want to download.
Tracker - A server that manages the BitTorrent file-transfer
process.
HOW BITTORRENT WORKS?
May22,2013
17
•You open a Web page and click on a link for the file you want.
•BitTorrent client software communicates with a tracker to find
other computers running BitTorrent that have the complete file
(seed computers) and those with a portion of the file (peers that are
usually in the process of downloading the file).
•The tracker identifies the swarm, which are connected computers
that have all or a portion of the file and are in the process of sending
or receiving it.
•The tracker helps the client software to trade pieces of the file we
want with other computers in the swarm. Your computer receives
multiple pieces of the file simultaneously.
CONTD.
May22,2013
18
If you continue to run the BitTorrent client software after your
download is complete, others can receive .torrent files from your
computer; your future download rates improve because you are ranked
higher in the "tit-for-tat" system.
DOWNLOADING FILES USING BITTORRENT
May22,2013
19
•Just like you need a URL: www.google.com to go to that site
and download content.We need a „torrent file‟ that tells
BitTorrent the necessary information to download the content.
•Websites like legaltorrents.com offer all kinds of torrents.
•Once you have obtained torrent file, you need to import it to
BitTorrent:
•Click File->Add Torrent or Press CTRL+O.
•Double click on Torrent file.
May22,2013
20
SEEDING TORRENT
May22,2013
21
•Seeding is where you leave your BitTorrent client
after you finish download to help distribute it.
•BitTorrent will continue seeding until you remove it
(Right click the torrent and hit Remove) .
HOW TO CREATE A .TORRENT FILE
May22,2013
22
CONTD.
May22,2013
23
May22,2013
24
Creating a torrent file
CONCLUSION
 News of increased adoption of this revolutionary protocol
continues to emerge, and this seems to be a rich area for
continued research in computer networking, with significant
potential benefits to society.
 If BitTorrent and similar protocols do find a legal place in the
internet, it will certainly help to pave the way for distributing
rich media on the internet, and provide the impetus for new
innovations.
May22,2013
25
REFERENCES
May22,2013
26
1. http://computer.howstuffworks.com/bittorrent.htm
2. http://en.wikipedia.org/wiki/BitTorrent
3. http://computer.howstuffworks.com/file-sharing.htm
4. http://en.wikipedia.org/wiki/World_Wide_Web
5. http://en.wikipedia.org/wiki/Computer_network
6. http://www.bittorrent.com/help/guides/beginners-guide
THANK YOU...!
May22,2013
27

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Distributed Computing in IoT
Distributed Computing in IoTDistributed Computing in IoT
Distributed Computing in IoT
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Chat App Presentation.pptx
Chat App Presentation.pptxChat App Presentation.pptx
Chat App Presentation.pptx
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensics
 
Transport layer
Transport layer Transport layer
Transport layer
 
Freenet
FreenetFreenet
Freenet
 
Chapter 3 : User Datagram Protocol (UDP)
Chapter 3 : User Datagram Protocol (UDP)Chapter 3 : User Datagram Protocol (UDP)
Chapter 3 : User Datagram Protocol (UDP)
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 

Andere mochten auch

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierMohd253
 
Introduction to BitTorrent Bundle
Introduction to BitTorrent BundleIntroduction to BitTorrent Bundle
Introduction to BitTorrent Bundlebittorrentinc
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocoltmont
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje VirtualJosé D Landa
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent techtalks_dht
Bit torrent techtalks_dhtBit torrent techtalks_dht
Bit torrent techtalks_dhtbittorrentinc
 
Bittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaBittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaSrikanth Vanama
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenecEugene Cheng
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingVelocity Partners
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...Lukas Koster
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocolINSIGHT FORENSIC
 

Andere mochten auch (20)

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Introduction to BitTorrent Bundle
Introduction to BitTorrent BundleIntroduction to BitTorrent Bundle
Introduction to BitTorrent Bundle
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje Virtual
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Magnet links
Magnet linksMagnet links
Magnet links
 
Bit torrent techtalks_dht
Bit torrent techtalks_dhtBit torrent techtalks_dht
Bit torrent techtalks_dht
 
DHT and NAT
DHT and NATDHT and NAT
DHT and NAT
 
Bittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaBittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_Vanama
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B Marketing
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 

Ähnlich wie Bit torrent ppt (20)

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
BitTorrent.pdf
BitTorrent.pdfBitTorrent.pdf
BitTorrent.pdf
 
gampong.pptx
gampong.pptxgampong.pptx
gampong.pptx
 

Mehr von Santosh Kumar

human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence pptSantosh Kumar
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systemsSantosh Kumar
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

Mehr von Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Bit torrent ppt

  • 1. BITTORRENT May22,2013 1 By K Ravi Teja Varma 09131A1272 B. Tech, 8th Sem
  • 2. CONTENTS May22,2013 2 •Introduction •Types Of Data Sharing •Traditional Client-Server Downloading •Peer-Peer Downloading •Gnutella Network •Why BitTorrent? •What actually a BitTorrent is? •BitTorrent Terminology •How BitTorrent works? •Downloading Files Using BitTorrent •Seeding Torrent •How to create a dot torrent file •Conclusion •References
  • 3. INTRODUCTION May22,2013 3 • Humans tend to share things. • As electronic data plays a vital role these days, they acquire the “sharing” attribute. • Sharing electronic data(emails, ebooks, multimedia files) is the need of the hour. • Data sharing must be fast enough as we are now moving to 3G and 4G technologies, users expect data sharing at high speeds.
  • 4. TYPES OF DATA SHARING  Manual Sharing Using Removable Media: Such as USB drives, External Hard disks.  Centralized Servers of Computer Networks: Network of computers interconnected for sharing resources and information via a central server.  Distributed Peer-to-Peer networking: Is a Computer network where each system in the network acts as client or server allowing shared access of resources without the need of central server. May22,2013 4
  • 5. TRADITIONAL CLIENT-SERVER DOWNLOADING May22,2013 5 •You open a Webpage and click a link to download a file to your computer. •The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer. •The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
  • 6. CONTD. May22,2013 6 •The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. •If the file is both large and popular, the demands on the server are great, and the download will be slow.
  • 7. PEER-PEER DOWNLOADING May22,2013 7 •In peer-to-peer sharing, a software program is used instead a Web Browser to locate computers that have the file user want. •These are ordinary computers like the users, they are called PEERS. • The process works like this: • You run peer-to-peer file-sharing software (for example, a Napster program or Gnutella) on your computer and send out a request for the file you want to download. •To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
  • 8. CONTD. May22,2013 8 •When the software finds a computer that has the file you want on its hard drive , the download begins. •Others using the file-sharing software can obtain files they want from your computer's hard drive. •The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks.
  • 9. CONTD. May22,2013 9 •Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. • This limits the number of computers the software can search for the requested file .
  • 10. GNUTELLA NETWORK May22,2013 10 How a Gnutella client finds a song Given that there is no central server to store the names and locations of all the available files, how does the Gnutella software on your machine find a song on someone else's machine? The process goes like this: • Type the name of the song or file we want to find. • Your machine knows of at least one other Gnutella machine somewhere on the network.
  • 11. CONTD. May22,2013 11 •Your machine sends the song name you typed in to the Gnutella machine(s) . •These machines search to see if the requested file is on the local hard disk. If so, they send back the file name (and machine IP address) to the requester. •At the same time, all of these machines send out the same request to the machines they are connected to, and the process repeats. •A request has a TTL (time to live) limit placed on it.
  • 12. CONTD. May22,2013 12  A request might go out six or seven levels deep before it stops propagating. If each machine on the Gnutella network knows of just four others, that means that your request might reach 8,000 or so other machines on the Gnutella network if it propagates seven levels deep.
  • 13. CONTD. May22,2013 13 •It is an extremely simple and clever way of distributing a query to thousands of machines very quickly. •This approach has one big advantage -- Gnutella works all the time , as long as you can get to at least one other machine running Gnutella software, you are able to query the network. •No court order is going to shut this system down, because there is no one machine that controls everything.
  • 14. WHY BITTORRENT? May22,2013 14 •Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server called a Tracker. •Another difference is that it uses a principal called tit-for-tat. •This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goal.
  • 15. WHAT IS BITTORRENT? May22,2013 15 •BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. •It costs nothing to use and includes no spyware or pop-up advertising. •The most popular video, audio or software files can be transferred faster and cheaper by using BitTorrent.
  • 16. BITTORRENT TERMINOLOGY May22,2013 16 Leeches - People who download files but do not share files on their own computer with others. Seed or seeder - A computer with a complete copy of a BitTorrent file (At least one seed computer is necessary for a BitTorrent download to operate). Swarm - A group of computers simultaneously sending (uploading) or receiving (downloading) the same file. .torrent - A pointer file that directs your computer to the file you want to download. Tracker - A server that manages the BitTorrent file-transfer process.
  • 17. HOW BITTORRENT WORKS? May22,2013 17 •You open a Web page and click on a link for the file you want. •BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file). •The tracker identifies the swarm, which are connected computers that have all or a portion of the file and are in the process of sending or receiving it. •The tracker helps the client software to trade pieces of the file we want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.
  • 18. CONTD. May22,2013 18 If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.
  • 19. DOWNLOADING FILES USING BITTORRENT May22,2013 19 •Just like you need a URL: www.google.com to go to that site and download content.We need a „torrent file‟ that tells BitTorrent the necessary information to download the content. •Websites like legaltorrents.com offer all kinds of torrents. •Once you have obtained torrent file, you need to import it to BitTorrent: •Click File->Add Torrent or Press CTRL+O. •Double click on Torrent file.
  • 21. SEEDING TORRENT May22,2013 21 •Seeding is where you leave your BitTorrent client after you finish download to help distribute it. •BitTorrent will continue seeding until you remove it (Right click the torrent and hit Remove) .
  • 22. HOW TO CREATE A .TORRENT FILE May22,2013 22
  • 25. CONCLUSION  News of increased adoption of this revolutionary protocol continues to emerge, and this seems to be a rich area for continued research in computer networking, with significant potential benefits to society.  If BitTorrent and similar protocols do find a legal place in the internet, it will certainly help to pave the way for distributing rich media on the internet, and provide the impetus for new innovations. May22,2013 25
  • 26. REFERENCES May22,2013 26 1. http://computer.howstuffworks.com/bittorrent.htm 2. http://en.wikipedia.org/wiki/BitTorrent 3. http://computer.howstuffworks.com/file-sharing.htm 4. http://en.wikipedia.org/wiki/World_Wide_Web 5. http://en.wikipedia.org/wiki/Computer_network 6. http://www.bittorrent.com/help/guides/beginners-guide