SlideShare a Scribd company logo
1 of 27
Prepared By :- Harsh M Tirghoda
BitTorrent is an open-source peer-to-peer protocol designed for the transfer of large files. The central philosophy underlying BitTorrent is that users should upload data simultaneously with their downloading which maximizes network bandwidth efficiency. BitTorrent is designed to be more efficient and will work better if there are more people interested in a specific file. The protocol is the brainchild of programmer Bram Cohen, who designed it in April 2001 and released a first implementation on 2 July 2001. It is now maintained by Cohen's company BitTorrent, Inc. What is BitTorrent..?
Peer-to-peer protocols, use a network of clients (each functioning as a server) to send data to other users who are looking for similar files. The only server in a BitTorrent network is a tracker which monitors which files are available and where, and directs clients who are looking for the files for downloading to where the files are available. Peer-to-peer transfer protocols are less expensive than the client-server model. Another advantage of BitTorrent is that it is an open source application. BitTorrent is free unlike other peer-to-peer systems (e.g. Kazaa, Gnutella). Any user can download the software and have it ready for use. In-house programmers can also modify the system to their companies' specific needs and requirements. BitTorrent: Peer-to-Peer File Transfer Protocol
The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. If the file is both large and popular, the demands on the server are great, and the download will be slow.  Traditional Client-Server Downloading
Peer-to-peer file sharing  is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called  peers . The process works like this: You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download.  To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.  When the software finds a computer that has the file you want on its hard drive, the download begins.  Others using the file-sharing software can obtain files they want from your computer's hard drive.  Peer-to-peer File Sharing
The file-transfer load is distributed between the computers exchanging files. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called  leeching .  This limits the number of computers the software can search for the requested file. Gnutella's peer-to-peer download process
Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server (called a  tracker ).  Another difference is that it uses a principal called  tit-for-tat . This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goals. With BitTorrent, the more files you share with others, the faster your downloads are.  Finally, to make better use of available Internet bandwidth, BitTorrent downloads different pieces of the file you want simultaneously from multiple computers. What BitTorrent Does
You open a Web page and click on a link for the file you want.  BitTorrent client software communicates with a  tracker  to find other computers running BitTorrent that have the complete file ( seed  computers) and those with a portion of the file (peers that are usually in the process of downloading the file).  The tracker identifies the  swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.  BitTorrent's peer-to-peer download process
The tracker identifies the  swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.  The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.  If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.  Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, BitTorrent is especially useful for large, popular files.  Here's how it works:
It is important to be aware of the terminology used when downloading torrent files: Client  - A client is the actual P2P sharing program and it is usually an application that is downloaded and installed on the computer that you would like to use for sharing and downloading files. Two popular P2P clients are Azureus and UTorrent (more on these clients below). Tracker  - A tracker is a central server that manages the sharing of files among its many users. Most clients have built in trackers; there are also specific tracking programs such as BNBT and CBTT.  Seeder  - A seeder is considered a computer that has a complete copy of a file another computer is requesting. For instance, if you would like to download an mp3, you must first make sure that the tracker can find a full copy (seed) of the file that you would like to download. Important Terms You Should Know When Downloading Torrent Files
Leeches  - A leach is a person that is downloading a file or files from other computers, but is not sharing any files of his or her own. Leeching is considered bad etiquette on P2P clients. Swarm  - A swarm is when two or more computers are simultaneously downloading and sharing the same file. Most clients allow a computer to download a file and then upload to others the parts that already have been downloaded. .torrent  - a torrent is a file that is downloaded from an index web site and  sometimes referred to as an archive. It is a very small file usually less than 25bits, that is necessary for your client to start and manage the file transfer process so you can download the file. Important Terms You Should Know When Downloading Torrent Files
First download and install a torrent client. Remember the torrent client is considered the command center for your P2P file sharing. You can choose many different types of torrent sharing clients; however two highly recommended clients are UTorrent and Azureus. Once you have your torrent client downloaded and installed, you will need to search for files that you would like to download. Usually you can visit many index web sites such as Pirate bay and Torrent Spy. Most torrent clients have a list handy of the best index web sites. Now, just search for the file that you would like to download. Some of these sites offer advanced searches such as the ability to search for a video file, music file, application file or all of the above. It is usually extremely easy to locate the torrent file that you would like to download. Once you have searched for a specific file, your index web site should return a list of available torrent files. Look to see which torrent files have the most seeders, usually this will give you the fastest download times and highest quality files. How to Download a Torrent File
Once you find the torrent file that you would like to download, click the download link and save it onto your computer. These files are usually very small, around 200kb. Now that you have the torrent file or archive on your computer, double click this file and your torrent client should automatically open up. At this time, the tracker program will come online as well and will start to manage and download your file. While each client and tracker program is different, you should be able to see how many people are downloading the file, seeding and sharing or leeching. You should also see the progress of your computer downloading the file and the amount of time remaining until the file is completely downloaded. All you have to do now is waiting until all the data is downloaded and then you can enjoy your new downloaded file. How to Download a Torrent File
While there are more than a dozen P2P torrent clients available, two of the top rated P2P torrent clients are UTorrent and Azureus.    Utorrent Utorrent is actually torrent and means micro torrent. It is a freeware Bit Torrent client that works great on Windows computers. The major feature of this Bit Torrent client is that the entire program is only around 200 Kb. This program was developed to require the least amount of computer resources and give as much functionality as possible. Although UTorrent is extremely small it has a lot of features including Unicode support, protocol encryption, peer exchange with other UTorrent users and Azureus users (this feature goes above and beyond normal P2P, similar to chat), configurable bandwidth settings, Customizable user interface, initial seeding and the availability of this application in 38 languages. Top P2P Torrent Clients
Azureus is another P2P Torrent Client, it is based on Java (You need to have JRE installed, but that is very common).It is also a free software client and it works on many different platforms including Windows, Mac, Linux and UNIX. One of the key features of Azureus is that it allows multiple download files easily from a GUI interface. You can also open up and view or hear files that are currently downloading, but not yet complete. This makes it easy to check the quality of the file before you spend a significant amount of time downloading it. Azureus has its own tracker program so you can easily share files without uploading them to centralized sites. Azureus is considered one of the top Bit Torrent clients and has a wealth of features that are designed and integrated into the client very well.  Top P2P Torrent Clients
ABC - Another BT client BitTornado G3 Torrent BitComet Vuze (Azureus 3.0) Some other BitTorrent Clients
ABC - Another BT client
BitTornado
G3 Torrent
BitComet
Vuze (Azureus 3.0)
BNBT  is a complete port of the original Python-based BitTorrent tracker for speed and efficiency. BNBT also offers many additional features not present in the original tracker. CBTT  is a modified BNBT-Based BitTorrent tracker project developed primarily by DreadWingKnight EasyTracker  is a customized version of BNBT specifically designed for Windows users. It even comes with an installer and detailed installation and customization instructions. XBNBT  is a modified, open source, BitTorrent tracker based on BNBT, offers many additional features such as support for flat-file or MySQL database operation, control over TCP parameters, additional administrative, statistics, and control options, additional filter and search facilities, and more. BitTorrent Trackers
Lack of anonymity BitTorrent does not offer its users anonymity. It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker. This may expose users with insecure systems to attacks.  Dialup versus broadband BitTorrent is best suited to continuously connected broadband environments, since dial-up users find it less efficient due to frequent disconnects and slow download rates. Limitations and security
The leech problem BitTorrent file sharers, compared to users of client/server technology, often have little incentive to become seeders after they finish downloading. The result of this is that torrent swarms gradually die out, meaning a lower possibility of obtaining older torrents.  The cheater problem There are "cheating" clients like BitThief which claim to be able to download without uploading, and because of this can sometimes download faster than regular clients. Such exploitation negatively affects the cooperative nature of the BitTorrent protocol. Limitations and security
Bit Torrent Clients are usually the fastest, most affordable and most convenient way to share files among many users. Most Bit Torrent P2P users can find plenty of files available and download them with ease. With the explosion of broadband, you can easily find and download files of any size, from mp3's to large multi gigabyte video files.  But, sometimes Bit Torrent clients include adware or spyware, so it is favorable to use this only if you’re having An effective antivirus application with spyware & adware detector. Make sure you always download the client from the official web site and read the EULA (end user licensing agreement) to make sure there are no adware or spyware included. Conclusion
[object Object],[object Object],[object Object],[object Object],[object Object],References
 

More Related Content

What's hot

Giáo trình phân tích thiết kế hệ thống ICTU
Giáo trình phân tích thiết kế hệ thống ICTUGiáo trình phân tích thiết kế hệ thống ICTU
Giáo trình phân tích thiết kế hệ thống ICTUNgô Doãn Tình
 
Giáo Trình Phương Pháp Luận Lập Trình ICTU
Giáo Trình Phương Pháp Luận Lập Trình ICTUGiáo Trình Phương Pháp Luận Lập Trình ICTU
Giáo Trình Phương Pháp Luận Lập Trình ICTUNgô Doãn Tình
 
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...vanphu2103
 
dan luan_ngon_ngu
dan luan_ngon_ngudan luan_ngon_ngu
dan luan_ngon_nguTrieu Dong
 
docx.vn - Xay dung website ban quan ao online
docx.vn - Xay dung website ban quan ao onlinedocx.vn - Xay dung website ban quan ao online
docx.vn - Xay dung website ban quan ao onlineVi Thái
 

What's hot (9)

Giáo trình phân tích thiết kế hệ thống ICTU
Giáo trình phân tích thiết kế hệ thống ICTUGiáo trình phân tích thiết kế hệ thống ICTU
Giáo trình phân tích thiết kế hệ thống ICTU
 
Đề tài: Hệ thống quản lý mua bán của trung tâm nội thất, HAY
Đề tài: Hệ thống quản lý mua bán của trung tâm nội thất, HAYĐề tài: Hệ thống quản lý mua bán của trung tâm nội thất, HAY
Đề tài: Hệ thống quản lý mua bán của trung tâm nội thất, HAY
 
Giáo Trình Phương Pháp Luận Lập Trình ICTU
Giáo Trình Phương Pháp Luận Lập Trình ICTUGiáo Trình Phương Pháp Luận Lập Trình ICTU
Giáo Trình Phương Pháp Luận Lập Trình ICTU
 
Mã đường truyền
Mã đường truyềnMã đường truyền
Mã đường truyền
 
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...
Báo cáo thực tập cuối kỳ đề tài xây dựng website thương mại điện tử bằng Open...
 
dan luan_ngon_ngu
dan luan_ngon_ngudan luan_ngon_ngu
dan luan_ngon_ngu
 
Web services in ax 2012
Web services in ax 2012Web services in ax 2012
Web services in ax 2012
 
Chuong4 uni
Chuong4 uniChuong4 uni
Chuong4 uni
 
docx.vn - Xay dung website ban quan ao online
docx.vn - Xay dung website ban quan ao onlinedocx.vn - Xay dung website ban quan ao online
docx.vn - Xay dung website ban quan ao online
 

Viewers also liked

Viewers also liked (20)

Lecture 1. introduction
Lecture 1. introductionLecture 1. introduction
Lecture 1. introduction
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
техник хангамж
техник хангамжтехник хангамж
техник хангамж
 
Torrent
TorrentTorrent
Torrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
2011 (5) mar
2011 (5) mar2011 (5) mar
2011 (5) mar
 
Exist Customer Success Stories
Exist Customer Success StoriesExist Customer Success Stories
Exist Customer Success Stories
 
Hoja de ruta jornada de inducción a madres y padres
Hoja de ruta jornada de inducción a madres y padresHoja de ruta jornada de inducción a madres y padres
Hoja de ruta jornada de inducción a madres y padres
 
Mengapa harus abe
Mengapa harus abeMengapa harus abe
Mengapa harus abe
 
Saint louis science center
Saint louis science centerSaint louis science center
Saint louis science center
 
Exploring membership 4
Exploring membership 4Exploring membership 4
Exploring membership 4
 
嘔氣~不要跟你的愛人
嘔氣~不要跟你的愛人嘔氣~不要跟你的愛人
嘔氣~不要跟你的愛人
 
Reaching millennials who leave
Reaching millennials who leaveReaching millennials who leave
Reaching millennials who leave
 
Marketing Day - French Style or German Reliability - Alex Kowalczyk
Marketing Day - French Style or German Reliability - Alex KowalczykMarketing Day - French Style or German Reliability - Alex Kowalczyk
Marketing Day - French Style or German Reliability - Alex Kowalczyk
 
Wire Checklist
Wire ChecklistWire Checklist
Wire Checklist
 
Paying the preacher 2
Paying the preacher 2Paying the preacher 2
Paying the preacher 2
 
Off the Shelf 1.2
Off the Shelf 1.2Off the Shelf 1.2
Off the Shelf 1.2
 
Sharing your faith training
Sharing your faith trainingSharing your faith training
Sharing your faith training
 

Similar to Torrent Protocol

Similar to Torrent Protocol (20)

Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Torrent Protocol

  • 1. Prepared By :- Harsh M Tirghoda
  • 2. BitTorrent is an open-source peer-to-peer protocol designed for the transfer of large files. The central philosophy underlying BitTorrent is that users should upload data simultaneously with their downloading which maximizes network bandwidth efficiency. BitTorrent is designed to be more efficient and will work better if there are more people interested in a specific file. The protocol is the brainchild of programmer Bram Cohen, who designed it in April 2001 and released a first implementation on 2 July 2001. It is now maintained by Cohen's company BitTorrent, Inc. What is BitTorrent..?
  • 3. Peer-to-peer protocols, use a network of clients (each functioning as a server) to send data to other users who are looking for similar files. The only server in a BitTorrent network is a tracker which monitors which files are available and where, and directs clients who are looking for the files for downloading to where the files are available. Peer-to-peer transfer protocols are less expensive than the client-server model. Another advantage of BitTorrent is that it is an open source application. BitTorrent is free unlike other peer-to-peer systems (e.g. Kazaa, Gnutella). Any user can download the software and have it ready for use. In-house programmers can also modify the system to their companies' specific needs and requirements. BitTorrent: Peer-to-Peer File Transfer Protocol
  • 4. The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. If the file is both large and popular, the demands on the server are great, and the download will be slow. Traditional Client-Server Downloading
  • 5. Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers . The process works like this: You run peer-to-peer file-sharing software on your computer and send out a request for the file you want to download. To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software. When the software finds a computer that has the file you want on its hard drive, the download begins. Others using the file-sharing software can obtain files they want from your computer's hard drive. Peer-to-peer File Sharing
  • 6. The file-transfer load is distributed between the computers exchanging files. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching . This limits the number of computers the software can search for the requested file. Gnutella's peer-to-peer download process
  • 7. Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server (called a tracker ). Another difference is that it uses a principal called tit-for-tat . This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goals. With BitTorrent, the more files you share with others, the faster your downloads are. Finally, to make better use of available Internet bandwidth, BitTorrent downloads different pieces of the file you want simultaneously from multiple computers. What BitTorrent Does
  • 8. You open a Web page and click on a link for the file you want. BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file ( seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file). The tracker identifies the swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. BitTorrent's peer-to-peer download process
  • 9. The tracker identifies the swarm , which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it. The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously. If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system. Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, BitTorrent is especially useful for large, popular files. Here's how it works:
  • 10. It is important to be aware of the terminology used when downloading torrent files: Client - A client is the actual P2P sharing program and it is usually an application that is downloaded and installed on the computer that you would like to use for sharing and downloading files. Two popular P2P clients are Azureus and UTorrent (more on these clients below). Tracker - A tracker is a central server that manages the sharing of files among its many users. Most clients have built in trackers; there are also specific tracking programs such as BNBT and CBTT. Seeder - A seeder is considered a computer that has a complete copy of a file another computer is requesting. For instance, if you would like to download an mp3, you must first make sure that the tracker can find a full copy (seed) of the file that you would like to download. Important Terms You Should Know When Downloading Torrent Files
  • 11. Leeches - A leach is a person that is downloading a file or files from other computers, but is not sharing any files of his or her own. Leeching is considered bad etiquette on P2P clients. Swarm - A swarm is when two or more computers are simultaneously downloading and sharing the same file. Most clients allow a computer to download a file and then upload to others the parts that already have been downloaded. .torrent - a torrent is a file that is downloaded from an index web site and sometimes referred to as an archive. It is a very small file usually less than 25bits, that is necessary for your client to start and manage the file transfer process so you can download the file. Important Terms You Should Know When Downloading Torrent Files
  • 12. First download and install a torrent client. Remember the torrent client is considered the command center for your P2P file sharing. You can choose many different types of torrent sharing clients; however two highly recommended clients are UTorrent and Azureus. Once you have your torrent client downloaded and installed, you will need to search for files that you would like to download. Usually you can visit many index web sites such as Pirate bay and Torrent Spy. Most torrent clients have a list handy of the best index web sites. Now, just search for the file that you would like to download. Some of these sites offer advanced searches such as the ability to search for a video file, music file, application file or all of the above. It is usually extremely easy to locate the torrent file that you would like to download. Once you have searched for a specific file, your index web site should return a list of available torrent files. Look to see which torrent files have the most seeders, usually this will give you the fastest download times and highest quality files. How to Download a Torrent File
  • 13. Once you find the torrent file that you would like to download, click the download link and save it onto your computer. These files are usually very small, around 200kb. Now that you have the torrent file or archive on your computer, double click this file and your torrent client should automatically open up. At this time, the tracker program will come online as well and will start to manage and download your file. While each client and tracker program is different, you should be able to see how many people are downloading the file, seeding and sharing or leeching. You should also see the progress of your computer downloading the file and the amount of time remaining until the file is completely downloaded. All you have to do now is waiting until all the data is downloaded and then you can enjoy your new downloaded file. How to Download a Torrent File
  • 14. While there are more than a dozen P2P torrent clients available, two of the top rated P2P torrent clients are UTorrent and Azureus. Utorrent Utorrent is actually torrent and means micro torrent. It is a freeware Bit Torrent client that works great on Windows computers. The major feature of this Bit Torrent client is that the entire program is only around 200 Kb. This program was developed to require the least amount of computer resources and give as much functionality as possible. Although UTorrent is extremely small it has a lot of features including Unicode support, protocol encryption, peer exchange with other UTorrent users and Azureus users (this feature goes above and beyond normal P2P, similar to chat), configurable bandwidth settings, Customizable user interface, initial seeding and the availability of this application in 38 languages. Top P2P Torrent Clients
  • 15. Azureus is another P2P Torrent Client, it is based on Java (You need to have JRE installed, but that is very common).It is also a free software client and it works on many different platforms including Windows, Mac, Linux and UNIX. One of the key features of Azureus is that it allows multiple download files easily from a GUI interface. You can also open up and view or hear files that are currently downloading, but not yet complete. This makes it easy to check the quality of the file before you spend a significant amount of time downloading it. Azureus has its own tracker program so you can easily share files without uploading them to centralized sites. Azureus is considered one of the top Bit Torrent clients and has a wealth of features that are designed and integrated into the client very well. Top P2P Torrent Clients
  • 16. ABC - Another BT client BitTornado G3 Torrent BitComet Vuze (Azureus 3.0) Some other BitTorrent Clients
  • 17. ABC - Another BT client
  • 22. BNBT is a complete port of the original Python-based BitTorrent tracker for speed and efficiency. BNBT also offers many additional features not present in the original tracker. CBTT is a modified BNBT-Based BitTorrent tracker project developed primarily by DreadWingKnight EasyTracker is a customized version of BNBT specifically designed for Windows users. It even comes with an installer and detailed installation and customization instructions. XBNBT is a modified, open source, BitTorrent tracker based on BNBT, offers many additional features such as support for flat-file or MySQL database operation, control over TCP parameters, additional administrative, statistics, and control options, additional filter and search facilities, and more. BitTorrent Trackers
  • 23. Lack of anonymity BitTorrent does not offer its users anonymity. It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker. This may expose users with insecure systems to attacks. Dialup versus broadband BitTorrent is best suited to continuously connected broadband environments, since dial-up users find it less efficient due to frequent disconnects and slow download rates. Limitations and security
  • 24. The leech problem BitTorrent file sharers, compared to users of client/server technology, often have little incentive to become seeders after they finish downloading. The result of this is that torrent swarms gradually die out, meaning a lower possibility of obtaining older torrents. The cheater problem There are "cheating" clients like BitThief which claim to be able to download without uploading, and because of this can sometimes download faster than regular clients. Such exploitation negatively affects the cooperative nature of the BitTorrent protocol. Limitations and security
  • 25. Bit Torrent Clients are usually the fastest, most affordable and most convenient way to share files among many users. Most Bit Torrent P2P users can find plenty of files available and download them with ease. With the explosion of broadband, you can easily find and download files of any size, from mp3's to large multi gigabyte video files. But, sometimes Bit Torrent clients include adware or spyware, so it is favorable to use this only if you’re having An effective antivirus application with spyware & adware detector. Make sure you always download the client from the official web site and read the EULA (end user licensing agreement) to make sure there are no adware or spyware included. Conclusion
  • 26.
  • 27.