SlideShare a Scribd company logo
1 of 20
Presented by ABHISHEK ROY DEBASISH MUKHERJEE SUMAN HALDER BHANU PRATAP JHA
PROTOCOLS For data transfer over the network, protocols are used( to ensure interoperability) .Some of them are HTTP,FTP,SMTP etc..BitTorrent is also a kind of protocol..designed by Bram Cohen in 2001
BitTorrent P2P ,[object Object],[object Object]
P2P traffic is rising
Server Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet
BitTorrent Approach
File transfer 1 2 3 4 5 6 7 8
Peers Help Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet u 1 u 2 u 3 u 4 Upload rates u i {1,2,3,4,5} {1,2,3,4,5,6,7,8} {1,2,3,4} C1 C2 {1,2,3} {1,2} C3 C4 Clients c i
Piece Selection and Bencoding ,[object Object],[object Object],[object Object]
Error detection mechanism .torrent file contains hash which works as checksum.After downloading a file it is checked against the hash given within .torrent file,if mismatch occurs,then the downloaded file is corrupted ..
Chocking When a peer receives a request for a piece from another peer, it can  refuse to transmit that piece. If this happens, the peer is said to be choked
BT: publishing a file Web Server Initial seeder Tracker Downloader: A Seeder: B Downloader: C Harry Potter.torrent
Sub protocols ,[object Object],[object Object]
Operation
Why is it Important? ,[object Object],[object Object]
Bandwidth Shaping BitTorrent is usually used to transfer large sized files due to which the traffic over the ISPs increase to a large extent. To avoid such exploding traffic on their servers many ISPs have started to avoid the traffic caused by BitTorrent
Pollution Attack ,[object Object],1>The peers receive the peer list from the tracker. 2>One peer contacts the attacker for a chunk of the file. 3>The attacker sends back a false chunk. 4>Attacker requests all chunks from swarm and wastes their upload bandwidth.
DDOS Attack
Solutions ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]

More Related Content

What's hot

สรุปหน่วยที่2 โพรโตคอล
สรุปหน่วยที่2 โพรโตคอลสรุปหน่วยที่2 โพรโตคอล
สรุปหน่วยที่2 โพรโตคอล
soifha
 

What's hot (20)

UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
สรุปหน่วยที่2 โพรโตคอล
สรุปหน่วยที่2 โพรโตคอลสรุปหน่วยที่2 โพรโตคอล
สรุปหน่วยที่2 โพรโตคอล
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
 
Common ports
Common portsCommon ports
Common ports
 
Http Protocol
Http ProtocolHttp Protocol
Http Protocol
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Computer network
Computer networkComputer network
Computer network
 
BitTorrent.pdf
BitTorrent.pdfBitTorrent.pdf
BitTorrent.pdf
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Application layer
Application layer Application layer
Application layer
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Protocols
Protocols Protocols
Protocols
 

Similar to Bittorrent

Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
Avula Jagadeesh
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
Ali Habeeb
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
ssanda3
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 

Similar to Bittorrent (20)

BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Bittorrent

  • 1. Presented by ABHISHEK ROY DEBASISH MUKHERJEE SUMAN HALDER BHANU PRATAP JHA
  • 2. PROTOCOLS For data transfer over the network, protocols are used( to ensure interoperability) .Some of them are HTTP,FTP,SMTP etc..BitTorrent is also a kind of protocol..designed by Bram Cohen in 2001
  • 3.
  • 4. P2P traffic is rising
  • 5. Server Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet
  • 7. File transfer 1 2 3 4 5 6 7 8
  • 8. Peers Help Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet u 1 u 2 u 3 u 4 Upload rates u i {1,2,3,4,5} {1,2,3,4,5,6,7,8} {1,2,3,4} C1 C2 {1,2,3} {1,2} C3 C4 Clients c i
  • 9.
  • 10. Error detection mechanism .torrent file contains hash which works as checksum.After downloading a file it is checked against the hash given within .torrent file,if mismatch occurs,then the downloaded file is corrupted ..
  • 11. Chocking When a peer receives a request for a piece from another peer, it can refuse to transmit that piece. If this happens, the peer is said to be choked
  • 12. BT: publishing a file Web Server Initial seeder Tracker Downloader: A Seeder: B Downloader: C Harry Potter.torrent
  • 13.
  • 15.
  • 16. Bandwidth Shaping BitTorrent is usually used to transfer large sized files due to which the traffic over the ISPs increase to a large extent. To avoid such exploding traffic on their servers many ISPs have started to avoid the traffic caused by BitTorrent
  • 17.
  • 19.
  • 20.

Editor's Notes

  1. Good morning everybody..i am abc of CSE3rd YR n I am here to give a seminar on a protocol named bittorrent along with my friends deba,..,…
  2. Discuss the history n the reasons behind the invention of bittorrent including the faults in other protocols and DAP..dnt discuss d way bittorrent works..
  3. Discuss about the usage of this protocol over other protocols
  4. Mention about the popularity of P2P file transfer mode over other protocols..page(1-5)
  5. Consider a HTTP server and explain the client-server paradign of it with respect to the above snapshot
  6. First define webserver,seed,leecher,tracker,.torrent file and then only go ahead to explain the mechanism behind file transfer..skip d content of .torrent file.. Discuss about the various terms and their significance..how the connection is established b/w seed and client
  7. Stress upon packetisation and sequencing of packets from different peers,seeds and leechers
  8. Discuss the mechanism in detail by assuming a data is divided into 4-5 packets..data can be a software package
  9. Discuss about piece,block,sub-pieces and error checking mechanism with hash in detail and show the hash in next slide..
  10. Discuss about piece,block,sub-pieces and error checking mechanism with hash in detail